Skip to main content
Top

2014 | OriginalPaper | Chapter

Cryptanalysis of Geffe Generator Using Genetic Algorithm

Authors : Maiya Din, Ashok K. Bhateja, Ram Ratan

Published in: Proceedings of the Third International Conference on Soft Computing for Problem Solving

Publisher: Springer India

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The use of basic crypto-primitives or building blocks has a vital role in the design of secure crypto algorithms. Such crypto primitives must be analyzed prior to be incorporated in crypto algorithm. In cryptanalysis of any crypto algorithm, a cryptanalyst generally deals with intercepted crypts without much auxiliary information available to recover plaintext or key information. As brute force attack utilizes all possible trials exhaustively, it has high computing time complexity due to huge search space and hence is practically infeasible to mount on secure crypto algorithms. The Geffe generator is a non-linear binary key sequence generator. It consists of three linear feedback shift registers and a nonlinear combiner. In this paper, we attempt Geffe generator to find initial states of all three shift registers used. The initial states are the secret key bits that maintain the security of Geffe generator. To find secret key bits, one has to search huge key space exhaustively. We consider divide-and-conquer attack and genetic algorithm to reduce exhaustive searches significantly. Simulation results show that correct initial states of all shift registers can be obtained efficiently.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Stallings, W.: Cryptography and Network Security. Pearson, London (2012) Stallings, W.: Cryptography and Network Security. Pearson, London (2012)
2.
go back to reference Menzes, A., Oorschot, P.V., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996) Menzes, A., Oorschot, P.V., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)
3.
go back to reference Geffe, P.R.: How to protect data with ciphers that are really hard to break. Electronics 46(1), 99–101 (1973) Geffe, P.R.: How to protect data with ciphers that are really hard to break. Electronics 46(1), 99–101 (1973)
5.
go back to reference Wei, S.: On generalization of Geffe generator. Int. J. Comput. Sci. Netw. Sec. 6(8A), 161–165 (2006) Wei, S.: On generalization of Geffe generator. Int. J. Comput. Sci. Netw. Sec. 6(8A), 161–165 (2006)
7.
go back to reference Golic, J.D.: Correlation properties of a general combiner with memory. J. Cryptol. 9(2), 111–126 (1996)CrossRefMATH Golic, J.D.: Correlation properties of a general combiner with memory. J. Cryptol. 9(2), 111–126 (1996)CrossRefMATH
8.
go back to reference Penzhorn, W.T., Bruwer, C.S.: New correlation attacks on stream ciphers. In: Proceedings of IEEE AFRICON 2002, pp. 203–208 (2002) Penzhorn, W.T., Bruwer, C.S.: New correlation attacks on stream ciphers. In: Proceedings of IEEE AFRICON 2002, pp. 203–208 (2002)
9.
go back to reference Meier, W., Staffelbach, O.: Fast correlation attacks on stream ciphers. In: Advances in Cryptology—EUROCRYPT ‘88, LNCS 330, pp. 301–314 (1988) Meier, W., Staffelbach, O.: Fast correlation attacks on stream ciphers. In: Advances in Cryptology—EUROCRYPT ‘88, LNCS 330, pp. 301–314 (1988)
11.
go back to reference Dawson, E., Clark, A.: Divide and conqure attack on certain classes of stream ciphers. Cryptologia 18(1), 25–40 (1994)CrossRefMATH Dawson, E., Clark, A.: Divide and conqure attack on certain classes of stream ciphers. Cryptologia 18(1), 25–40 (1994)CrossRefMATH
12.
go back to reference Luengo, I.: Linear and non-linear sequences and applications to stream ciphers. Recent Trends Crypt.—Contemp. Math. 477, 21–46 (2009)CrossRefMathSciNet Luengo, I.: Linear and non-linear sequences and applications to stream ciphers. Recent Trends Crypt.—Contemp. Math. 477, 21–46 (2009)CrossRefMathSciNet
13.
go back to reference Davis, L.: The Handbook of Genetic Algorithms. Van Nostrand Reinhold, New Jersey (1991) Davis, L.: The Handbook of Genetic Algorithms. Van Nostrand Reinhold, New Jersey (1991)
14.
go back to reference Coley, D.A.: An Introduction to Genetic Algorithms for Scientists and Engineers. World Scientific, New Jersey (1999) Coley, D.A.: An Introduction to Genetic Algorithms for Scientists and Engineers. World Scientific, New Jersey (1999)
15.
go back to reference Haupt, R.L., Haupt, S.E.: Practical Genetic Algorithms. Wiley, New Jersey (1998) Haupt, R.L., Haupt, S.E.: Practical Genetic Algorithms. Wiley, New Jersey (1998)
16.
go back to reference Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison Wesley, Boston (2003) Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison Wesley, Boston (2003)
Metadata
Title
Cryptanalysis of Geffe Generator Using Genetic Algorithm
Authors
Maiya Din
Ashok K. Bhateja
Ram Ratan
Copyright Year
2014
Publisher
Springer India
DOI
https://doi.org/10.1007/978-81-322-1768-8_45

Premium Partner