Skip to main content
Erschienen in: Designs, Codes and Cryptography 1-2/2017

05.05.2016

Improving algebraic attacks on stream ciphers based on linear feedback shift register over \(\mathbb {F}_{2^k}\)

verfasst von: Sondre Rønjom

Erschienen in: Designs, Codes and Cryptography | Ausgabe 1-2/2017

Einloggen, um Zugang zu erhalten

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In this paper we investigate univariate algebraic attacks on filter generators over extension fields \(\mathbb {F}_q=\mathbb {F}_{2^n}\) with focus on the Welch–Gong (WG) family of stream ciphers. Our main contribution is to reduce the general algebraic attack complexity on such cipher by proving new and lower bounds for the spectral immunity of such ciphers. The spectral immunity is the univariate analog of algebraic immunity and instead of measuring degree of multiples of a multivariate polynomial, it measures the minimum number of nonzero coefficients of a multiple of a univariate polynomial. In particular, there is an algebraic degeneracy in these constructions, which, when combined with attacks based on low-weight multiples over \(\mathbb {F}_q\), provides much more efficient attacks than over \(\mathbb {F}_2\). With negligible computational complexity, our best attack breaks the primitive WG-5 if given access to 4 kilobytes of keystream, break WG-7 if given access to 16 kilobytes of keystream and break WG-8 if given access to half a megabyte of keystream. Our best attack on WG-16 targeted at 4G-LTE is less practical, and requires \(2^{103}\) computational complexity and \(2^{61}\) bits of keystream. In all instances, we significantly lower both keystream and computational complexity in comparison to previous estimates. On a side note, we resolve an open problem regarding the rank of a type of equation systems used in algebraic attacks.
Literatur
1.
Zurück zum Zitat Aagaard M.D., Gong G., Mota, R.K.: Hardware implementations of the WG-5 cipher for passive RFID tags, In: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013 pp. 29–34 (June 2013). Aagaard M.D., Gong G., Mota, R.K.: Hardware implementations of the WG-5 cipher for passive RFID tags, In: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013 pp. 29–34 (June 2013).
2.
Zurück zum Zitat Armknecht F.: Improving fast algebraic attacks. In: Proceedings of Fast Software Encryption 2004. Lecture Notes in Computer Science, vol. 3017, pp. 65–82, Springer, Berlin (2004). Armknecht F.: Improving fast algebraic attacks. In: Proceedings of Fast Software Encryption 2004. Lecture Notes in Computer Science, vol. 3017, pp. 65–82, Springer, Berlin (2004).
3.
Zurück zum Zitat Armknecht F., Ars G.: Introducing a new variant of fast algebraic attacks and minimizing their successive data complexity. In: Dawson E., Vaudenay S. (eds.) Mycrypt 2005 (International Conference on Cryptology in Malaysia). Lecture Notes in Computer Science, vol. 3715, pp. 16–32 (2005). Armknecht F., Ars G.: Introducing a new variant of fast algebraic attacks and minimizing their successive data complexity. In: Dawson E., Vaudenay S. (eds.) Mycrypt 2005 (International Conference on Cryptology in Malaysia). Lecture Notes in Computer Science, vol. 3715, pp. 16–32 (2005).
4.
Zurück zum Zitat Armknecht F., Krause M.: Algebraic attacks on combiners with memory. In: Advances in Cryptology-CRYPTO 2003. Lecture Notes in Computer Science, vol. 2729, pp. 162–176. Springer, Berlin (2003). Armknecht F., Krause M.: Algebraic attacks on combiners with memory. In: Advances in Cryptology-CRYPTO 2003. Lecture Notes in Computer Science, vol. 2729, pp. 162–176. Springer, Berlin (2003).
5.
Zurück zum Zitat Brynielsson L.: On the linear complexity of combined shift register sequences. In: William H.C (ed.) EUROCRYPT85, pp. 156–160. Springer, Berlin (1985). Brynielsson L.: On the linear complexity of combined shift register sequences. In: William H.C (ed.) EUROCRYPT85, pp. 156–160. Springer, Berlin (1985).
6.
Zurück zum Zitat Canteaut A.: Open problems related to algebraic attacks on stream ciphers. In: Coding and Cryptography, Lecture Notes in Computer Science, vol. 3969, pp. 120–134, Springer, Berlin (2006). Canteaut A.: Open problems related to algebraic attacks on stream ciphers. In: Coding and Cryptography, Lecture Notes in Computer Science, vol. 3969, pp. 120–134, Springer, Berlin (2006).
7.
Zurück zum Zitat Courtois N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology-Crypto’2003. Lecture Notes in Computer Science, vol. 2729, pp. 176–194, Springer, Berlin (2003). Courtois N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology-Crypto’2003. Lecture Notes in Computer Science, vol. 2729, pp. 176–194, Springer, Berlin (2003).
8.
Zurück zum Zitat Courtois N., Meier W.: Algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology—-Eurocrypt’2003. Lecture Notes in Computer Science, vol. 2656, pp. 345–359. Springer, Berlin (2003). Courtois N., Meier W.: Algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology—-Eurocrypt’2003. Lecture Notes in Computer Science, vol. 2656, pp. 345–359. Springer, Berlin (2003).
9.
Zurück zum Zitat Ding L., Jin C.: Cryptanalysis of lightweight WG-8 stream cipher. IEEE Trans. Inf. Forensics Secur. 9(4), 645–652 (2014). Ding L., Jin C.: Cryptanalysis of lightweight WG-8 stream cipher. IEEE Trans. Inf. Forensics Secur. 9(4), 645–652 (2014).
10.
Zurück zum Zitat ETSI/SAGE. Specification of the 3GPP Confidentiality and Integrity Algorithms UEA & UIA2 Document 2: Snow 3G Specification (version 1.1) (September 2006), http://www.3gpp.org/ftp ETSI/SAGE. Specification of the 3GPP Confidentiality and Integrity Algorithms UEA & UIA2 Document 2: Snow 3G Specification (version 1.1) (September 2006), http://​www.​3gpp.​org/​ftp
12.
Zurück zum Zitat Fan X., Mandal K., Gong G.: WG-8: A lightweight Stream cipher for resource-constrained smart devices, In: Singh K., Awasthi AK (eds.) Quality, Reliability, Security and Robustness in Heterogeneous Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer, Berlin. Fan X., Mandal K., Gong G.: WG-8: A lightweight Stream cipher for resource-constrained smart devices, In: Singh K., Awasthi AK (eds.) Quality, Reliability, Security and Robustness in Heterogeneous Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer, Berlin.
13.
Zurück zum Zitat Golomb S.W.: Shift Register Sequences. Holden-Day Inc, San Francisco (1967) (Revised edn, Aegean Park Press, Laguna Hills 1982). Golomb S.W.: Shift Register Sequences. Holden-Day Inc, San Francisco (1967) (Revised edn, Aegean Park Press, Laguna Hills 1982).
14.
Zurück zum Zitat Golomb S.W., Gong G.: Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar. Cambridge University Press, New York (2004). Golomb S.W., Gong G.: Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar. Cambridge University Press, New York (2004).
15.
Zurück zum Zitat Gong G., Rønjom S., Helleseth T., Hu H.: Fast discrete Fourier spectra attacks on stream ciphers. IEEE Trans. Inf. Theory, 57(8), 5555–5565 (2011). Gong G., Rønjom S., Helleseth T., Hu H.: Fast discrete Fourier spectra attacks on stream ciphers. IEEE Trans. Inf. Theory, 57(8), 5555–5565 (2011).
16.
Zurück zum Zitat Helleseth T., Rønjom S.: Simplifying algebraic attacks with univariate analysis. Information Theory and Applications Workshop (ITA) 2011, 1–7 (2011). Helleseth T., Rønjom S.: Simplifying algebraic attacks with univariate analysis. Information Theory and Applications Workshop (ITA) 2011, 1–7 (2011).
17.
Zurück zum Zitat Lidl R., Niederreiter H.: Finite Fields In Encyclopedia of Mathematics and Its Applications, Cambridge University Press, Cambridge (1997). Lidl R., Niederreiter H.: Finite Fields In Encyclopedia of Mathematics and Its Applications, Cambridge University Press, Cambridge (1997).
18.
Zurück zum Zitat Luo Y., Chai Q., Gong G., Lai X.: A Lightweight Stream Cipher, WG-7 for RFID Encryption and Authentication, In: IEEE Global Telecommunications Conference (GLOBECOM), Dec 2010, pp. 1–6 (2010). Luo Y., Chai Q., Gong G., Lai X.: A Lightweight Stream Cipher, WG-7 for RFID Encryption and Authentication, In: IEEE Global Telecommunications Conference (GLOBECOM), Dec 2010, pp. 1–6 (2010).
19.
Zurück zum Zitat Meier W., Pasalic E., Carlet C.: Algebraic attacks and decomposition of Boolean functions. In: Cachin C., Camenisch J (eds.) Advances in Cryptology - EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 474–491.Springer, Berlin (2004). Meier W., Pasalic E., Carlet C.: Algebraic attacks and decomposition of Boolean functions. In: Cachin C., Camenisch J (eds.) Advances in Cryptology - EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 474–491.Springer, Berlin (2004).
21.
Zurück zum Zitat Orumiehchiha M.A., Pieprzyk J., Steinfeld R.: Cryptanalysis of WG-7: a lightweight stream cipher. In: Cryptography and Communications, vol. 4, pp. 3–4, Springer, Berlin (2012). Orumiehchiha M.A., Pieprzyk J., Steinfeld R.: Cryptanalysis of WG-7: a lightweight stream cipher. In: Cryptography and Communications, vol. 4, pp. 3–4, Springer, Berlin (2012).
22.
Zurück zum Zitat Philip H., Rose G.G. In: Advances in Cryptology—CRYPTO 2004: Proceedings of 24th Annual International Cryptology Conference, Santa Barbara, California, USA, Aug 15–19, 2004. Lecture Notes in Computer Science. Rewriting variables: The complexity of fast algebraic attacks on stream ciphers. Springer, Berlin (2004). Philip H., Rose G.G. In: Advances in Cryptology—CRYPTO 2004: Proceedings of 24th Annual International Cryptology Conference, Santa Barbara, California, USA, Aug 15–19, 2004. Lecture Notes in Computer Science. Rewriting variables: The complexity of fast algebraic attacks on stream ciphers. Springer, Berlin (2004).
23.
Zurück zum Zitat Rønjom S., Helleseth T.: A New attack on the filter generator. IEEE Trans. Inf. Theory 53(5), 17520–17558 (2007). Rønjom S., Helleseth T.: A New attack on the filter generator. IEEE Trans. Inf. Theory 53(5), 17520–17558 (2007).
24.
Zurück zum Zitat Rønjom S., Helleseth T.: Attacking the filter generator over \(GF(2^m)\), Arithmetic of Finite Fields, First International Workshop, WAIFA 2007, Madrid, Spain, June 2007. Lecture Notes in Computer Science, vol. 4547, pp. 264–275 (2007). Rønjom S., Helleseth T.: Attacking the filter generator over \(GF(2^m)\), Arithmetic of Finite Fields, First International Workshop, WAIFA 2007, Madrid, Spain, June 2007. Lecture Notes in Computer Science, vol. 4547, pp. 264–275 (2007).
25.
Zurück zum Zitat Shparlinski I.E. : On the singularity of generalised Vandermonde matrices over finite fields. In: Finite Fields and Applications, vol. 11, no. 2, pp. 193–199. Elsevier Science Publishers B. V., North-Holland, (2005). Shparlinski I.E. : On the singularity of generalised Vandermonde matrices over finite fields. In: Finite Fields and Applications, vol. 11, no. 2, pp. 193–199. Elsevier Science Publishers B. V., North-Holland, (2005).
Metadaten
Titel
Improving algebraic attacks on stream ciphers based on linear feedback shift register over
verfasst von
Sondre Rønjom
Publikationsdatum
05.05.2016
Verlag
Springer US
Erschienen in
Designs, Codes and Cryptography / Ausgabe 1-2/2017
Print ISSN: 0925-1022
Elektronische ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-016-0212-9

Weitere Artikel der Ausgabe 1-2/2017

Designs, Codes and Cryptography 1-2/2017 Zur Ausgabe

OriginalPaper

Reflection ciphers