On Guess and Determine Cryptanalysis of LFSR-Based Stream Ciphers
In this paper, the complexity of applying a guess and determine attack to so-called Linear Feedback Shift register (LFSR)-based stream ciphers is analyzed. This family of stream ciphers uses a single or several LFSR and a filtering function F : GF(2) n rarr GF(2) m to generate the blocks of m ges 1...
Uložené v:
| Vydané v: | IEEE transactions on information theory Ročník 55; číslo 7; s. 3398 - 3406 |
|---|---|
| Hlavný autor: | |
| Médium: | Journal Article |
| Jazyk: | English |
| Vydavateľské údaje: |
New York, NY
IEEE
01.07.2009
Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Predmet: | |
| ISSN: | 0018-9448, 1557-9654 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | In this paper, the complexity of applying a guess and determine attack to so-called Linear Feedback Shift register (LFSR)-based stream ciphers is analyzed. This family of stream ciphers uses a single or several LFSR and a filtering function F : GF(2) n rarr GF(2) m to generate the blocks of m ges 1 keystream bits at the time. In difference to a classical guess and determine attack, a method based on guessing certain bits in order to determine the remaining secret key/state bits, our approach efficiently takes advantage of the reduced preimage space for relatively large m and at the same time employing the design structure of the cipher. Several variations of the algorithm are derived to circumvent the sensitivity of attack to the input data, n, m and the key length. In certain cases, our attack outperforms classical algebraic attacks; these being considered as one of the most efficient cryptanalyst tools for this type of ciphers. A superior performance of our attack over algebraic attacks is demonstrated in case the filtering function belongs to the extended Maiorana-McFarland class. |
|---|---|
| AbstractList | In this paper, the complexity of applying a guess and determine attack to so-called Linear Feedback Shift register (LFSR)-based stream ciphers is analyzed. This family of stream ciphers uses a single or several LFSR and a filtering function F : GF(2) super(n) rarr GF(2) super(m) to generate the blocks of m ges 1 keystream bits at the time. In difference to a classical guess and determine attack, a method based on guessing certain bits in order to determine the remaining secret key/state bits, our approach efficiently takes advantage of the reduced preimage space for relatively large m and at the same time employing the design structure of the cipher. Several variations of the algorithm are derived to circumvent the sensitivity of attack to the input data, n, m and the key length. In certain cases, our attack outperforms classical algebraic attacks; these being considered as one of the most efficient cryptanalyst tools for this type of ciphers. A superior performance of our attack over algebraic attacks is demonstrated in case the filtering function belongs to the extended Maiorana-McFarland class. In this paper, the complexity of applying a guess and determine attack to so-called Linear Feedback Shift register (LFSR)-based stream ciphers is analyzed. This family of stream ciphers uses a single or several LFSR and a filtering function $F:{hbox{GF}},(2)^n rightarrow {hbox{GF}},(2)^m$ to generate the blocks of $m geq 1$ keystream bits at the time. In difference to a classical guess and determine attack, a method based on guessing certain bits in order to determine the remaining secret key/state bits, our approach efficiently takes advantage of the reduced preimage space for relatively large $m$ and at the same time employing the design structure of the cipher. Several variations of the algorithm are derived to circumvent the sensitivity of attack to the input data, $n,m$ and the key length. In certain cases, our attack outperforms classical algebraic attacks ; these being considered as one of the most efficient cryptanalyst tools for this type of ciphers. A superior performance of our attack over algebraic attacks is demonstrated in case the filtering function belongs to the extended Maiorana-McFarland class. [PUBLICATION ABSTRACT] In this paper, the complexity of applying a guess and determine attack to so-called Linear Feedback Shift register (LFSR)-based stream ciphers is analyzed. This family of stream ciphers uses a single or several LFSR and a filtering function F : GF(2) n rarr GF(2) m to generate the blocks of m ges 1 keystream bits at the time. In difference to a classical guess and determine attack, a method based on guessing certain bits in order to determine the remaining secret key/state bits, our approach efficiently takes advantage of the reduced preimage space for relatively large m and at the same time employing the design structure of the cipher. Several variations of the algorithm are derived to circumvent the sensitivity of attack to the input data, n, m and the key length. In certain cases, our attack outperforms classical algebraic attacks; these being considered as one of the most efficient cryptanalyst tools for this type of ciphers. A superior performance of our attack over algebraic attacks is demonstrated in case the filtering function belongs to the extended Maiorana-McFarland class. |
| Author | Pasalic, E. |
| Author_xml | – sequence: 1 givenname: E. surname: Pasalic fullname: Pasalic, E. organization: IMFM, Ljubljana |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=21826072$$DView record in Pascal Francis |
| BookMark | eNp9kE1rGzEQhkVxoY7be6GXpRB62kTfKx0dp3ENBkPjnoVWO6Iya60rrQ_-95Gx8SGHXmYYeN4Z6blDkzhEQOgrwQ-EYP24XW0fKMa6FEoYkR_QlAjR1FoKPkFTjImqNefqE7rLeVdGLgidovkmVssj5FzZ2FXPMELahwjVIp0Oo422P-WQq8FX65fX3_WTzdBVr2MCu68W4fAXUv6MPnrbZ_hy7TP05-XndvGrXm-Wq8V8XTsm6Fhz3ClHLNbWtdwx3nHpMW67lkIH0kpFNfaecCa46hxxznvWFtI1wreCCDZDPy57D2n4V148mn3IDvreRhiO2SipFadC0kJ-f0fuhmMqf8mGaKGZYMXQDN1fIZud7X2y0YVsDinsbToZShSVuDkvwxfOpSHnBP6GEGzO5k0xb87mzdV8ich3ERdGO4YhjsmG_n_Bb5dgAIDbHYEboZqGvQG0PpCN |
| CODEN | IETTAW |
| CitedBy_id | crossref_primary_10_1007_s12095_025_00791_w crossref_primary_10_1016_j_cnsns_2012_12_018 crossref_primary_10_1109_TIM_2019_2909248 crossref_primary_10_1007_s11704_020_0182_y crossref_primary_10_1109_TII_2022_3151984 crossref_primary_10_3233_JHS_222024 crossref_primary_10_1007_s42979_024_02768_7 crossref_primary_10_1007_s10998_012_4631_8 crossref_primary_10_1038_s41598_024_75373_6 crossref_primary_10_1016_j_ins_2017_06_036 crossref_primary_10_1016_j_dsp_2013_11_004 crossref_primary_10_1016_j_aeue_2023_154835 crossref_primary_10_1049_iet_ifs_2012_0169 crossref_primary_10_1109_TIT_2011_2179006 |
| Cites_doi | 10.1007/978-3-540-45146-4_10 10.1007/978-3-540-31815-6_26 10.1109/TIR.2002.800492 10.1007/s10623-004-3995-z 10.1007/3-540-44598-6_31 10.1109/TIT.2002.807297 10.1109/TC.2003.1190582 10.1007/3-540-48405-1_13 10.1007/978-3-540-25937-4_5 10.1007/11496618_3 10.1007/3-540-44448-3_1 10.1007/11761679_10 10.1007/BF02252874 10.1109/18.623184 10.1007/978-3-540-24676-3_28 10.1109/TC.1985.1676518 10.1007/978-3-540-45146-4_11 10.1109/TIT.2004.833366 10.1109/TIT.2004.839524 10.1109/TIT.1969.1054260 10.1007/11941378_17 |
| ContentType | Journal Article |
| Copyright | 2009 INIST-CNRS Copyright Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jul 2009 |
| Copyright_xml | – notice: 2009 INIST-CNRS – notice: Copyright Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jul 2009 |
| DBID | 97E RIA RIE AAYXX CITATION IQODW 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
| DOI | 10.1109/TIT.2009.2021316 |
| DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Pascal-Francis Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ANTE: Abstracts in New Technology & Engineering Engineering Research Database |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional Engineering Research Database ANTE: Abstracts in New Technology & Engineering |
| DatabaseTitleList | Technology Research Database Technology Research Database |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Computer Science Applied Sciences |
| EISSN | 1557-9654 |
| EndPage | 3406 |
| ExternalDocumentID | 1753191561 21826072 10_1109_TIT_2009_2021316 5075877 |
| Genre | orig-research |
| GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABFSI ABQJQ ABVLG ACGFO ACGFS ACGOD ACIWK AENEX AETEA AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 E.L EBS EJD F5P HZ~ H~9 IAAWW IBMZZ ICLAB IDIHD IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P PQQKQ RIA RIE RNS RXW TAE TN5 VH1 VJK AAYXX CITATION IQODW RIG 7SC 7SP 8FD JQ2 L7M L~C L~D F28 FR3 |
| ID | FETCH-LOGICAL-c352t-40d8c1a09acb4c34d46f00bdb2ede6a68290ff143548dc1ccff3bb4cc75fb5153 |
| IEDL.DBID | RIE |
| ISICitedReferencesCount | 22 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000267222000033&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0018-9448 |
| IngestDate | Sun Sep 28 00:18:30 EDT 2025 Sun Nov 09 08:40:14 EST 2025 Mon Jul 21 09:17:00 EDT 2025 Sat Nov 29 03:53:07 EST 2025 Tue Nov 18 22:30:38 EST 2025 Tue Aug 26 16:47:33 EDT 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 7 |
| Keywords | Performance evaluation Filtering Stream ciphering Algebraic immunity guess and determine filter state guessing attack Boolean function stream ciphers Algorithm annihilators Shift register filtering generator Private key Algebraic attacks linear feedback shift register (LFSR) nonlinear combiner Security of data Cryptanalysis Secret key |
| Language | English |
| License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html CC BY 4.0 |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c352t-40d8c1a09acb4c34d46f00bdb2ede6a68290ff143548dc1ccff3bb4cc75fb5153 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 ObjectType-Article-2 ObjectType-Feature-1 content type line 23 |
| PQID | 195935321 |
| PQPubID | 36024 |
| PageCount | 9 |
| ParticipantIDs | crossref_primary_10_1109_TIT_2009_2021316 crossref_citationtrail_10_1109_TIT_2009_2021316 proquest_miscellaneous_869842562 ieee_primary_5075877 proquest_journals_195935321 pascalfrancis_primary_21826072 |
| PublicationCentury | 2000 |
| PublicationDate | 2009-07-01 |
| PublicationDateYYYYMMDD | 2009-07-01 |
| PublicationDate_xml | – month: 07 year: 2009 text: 2009-07-01 day: 01 |
| PublicationDecade | 2000 |
| PublicationPlace | New York, NY |
| PublicationPlace_xml | – name: New York, NY – name: New York |
| PublicationTitle | IEEE transactions on information theory |
| PublicationTitleAbbrev | TIT |
| PublicationYear | 2009 |
| Publisher | IEEE Institute of Electrical and Electronics Engineers The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| Publisher_xml | – name: IEEE – name: Institute of Electrical and Electronics Engineers – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
| References | ref15 menezes (ref24) 1997 ref31 meier (ref22) 2004; lncs 3027 ref11 ref32 gupta (ref14) 2005; lncs 3325 (ref12) 0 ref2 kurosawa (ref19) 1997; 3 ref18 courtois (ref8) 2005; lncs 3506 armknecht (ref1) 2004; lncs 3017 hong (ref16) 2005; lncs 3788 courtois (ref10) 2003; lncs 2656 tarannikov (ref30) 2000; lncs 1977 ref23 ref26 ref20 ref21 chepyzhov (ref6) 1991; lncs 547 ref28 ref27 goli (ref13) 1997; lncs 1233 armknecht (ref3) 2003; lncs 2729 ref29 nyberg (ref25) 1992; lncs 658 johansson (ref17) 1999; lncs 1592 ref4 ref5 courtois (ref7) 2003; lncs 2729 courtois (ref9) 2005; lncs 3935 |
| References_xml | – year: 0 ident: ref12 publication-title: ECRYPT Call for Stream Cipher Primitives – volume: lncs 1592 start-page: 347 year: 1999 ident: ref17 publication-title: Advances CryptologyEurocrypt – volume: lncs 2729 start-page: 162 year: 2003 ident: ref3 publication-title: Advances in CryptologyCRYPTO 2003 doi: 10.1007/978-3-540-45146-4_10 – volume: lncs 3325 start-page: 317 year: 2005 ident: ref14 publication-title: Information Security Applications doi: 10.1007/978-3-540-31815-6_26 – year: 1997 ident: ref24 publication-title: Handbook of Applied Cryptography – ident: ref26 doi: 10.1109/TIR.2002.800492 – volume: lncs 1233 start-page: 239 year: 1997 ident: ref13 publication-title: Advances in Cryptology?EUROCRYPT 97 – volume: lncs 547 start-page: 176 year: 1991 ident: ref6 publication-title: Advances in CryptologyEUROCRYPT'91 – ident: ref5 doi: 10.1007/s10623-004-3995-z – ident: ref31 doi: 10.1007/3-540-44598-6_31 – ident: ref18 doi: 10.1109/TIT.2002.807297 – ident: ref27 doi: 10.1109/TC.2003.1190582 – ident: ref20 doi: 10.1007/3-540-48405-1_13 – volume: lncs 3017 start-page: 65 year: 2004 ident: ref1 publication-title: Fast Software Encryption 2004 doi: 10.1007/978-3-540-25937-4_5 – volume: lncs 3506 start-page: 3 year: 2005 ident: ref8 article-title: algebraic attacks on combiner with memory and several outputs publication-title: Proc Int Conf Inf Security Cryptol ICISC 2004 doi: 10.1007/11496618_3 – volume: lncs 658 start-page: 92 year: 1992 ident: ref25 publication-title: Advances in Cryptology?EUROCRYPT 92 – ident: ref4 doi: 10.1007/3-540-44448-3_1 – volume: lncs 3935 start-page: 261 year: 2005 ident: ref9 publication-title: Information Security and Cryptology – ident: ref2 doi: 10.1007/11761679_10 – ident: ref23 doi: 10.1007/BF02252874 – ident: ref32 doi: 10.1109/18.623184 – volume: lncs 3027 start-page: 474 year: 2004 ident: ref22 publication-title: Advances in CryptologyEUROCRYPT 2004 doi: 10.1007/978-3-540-24676-3_28 – volume: lncs 3788 start-page: 353 year: 2005 ident: ref16 publication-title: ASIACRYPT – ident: ref29 doi: 10.1109/TC.1985.1676518 – volume: lncs 2729 start-page: 176 year: 2003 ident: ref7 publication-title: Advances in CryptologyCRYPTO 2003 doi: 10.1007/978-3-540-45146-4_11 – volume: lncs 2656 start-page: 346 year: 2003 ident: ref10 publication-title: Advances in CryptologyEUROCRYPT 2003 – ident: ref28 doi: 10.1109/TIT.2004.833366 – volume: 3 start-page: 721 year: 1997 ident: ref19 article-title: highly nonlinear -resilient functions publication-title: J Univ Comp Sci – volume: lncs 1977 start-page: 19 year: 2000 ident: ref30 publication-title: Proc Indocrypt – ident: ref15 doi: 10.1109/TIT.2004.839524 – ident: ref21 doi: 10.1109/TIT.1969.1054260 – ident: ref11 doi: 10.1007/11941378_17 |
| SSID | ssj0014512 |
| Score | 2.0971835 |
| Snippet | In this paper, the complexity of applying a guess and determine attack to so-called Linear Feedback Shift register (LFSR)-based stream ciphers is analyzed.... |
| SourceID | proquest pascalfrancis crossref ieee |
| SourceType | Aggregation Database Index Database Enrichment Source Publisher |
| StartPage | 3398 |
| SubjectTerms | Algebra Algebraic attacks Algebraic immunity Algorithms annihilators Applied sciences Boolean function Boolean functions Complexity Cryptography Detection, estimation, filtering, equalization, prediction Exact sciences and technology filter state guessing attack Filtering filtering generator Filtration guess and determine Hardware Information processing Information theory Information, signal and communications theory linear feedback shift register (LFSR) Linear feedback shift registers nonlinear combiner Nonlinear filters Protection Security Signal and communications theory Signal, noise stream ciphers Streams Telecommunications and information theory Throughput |
| Title | On Guess and Determine Cryptanalysis of LFSR-Based Stream Ciphers |
| URI | https://ieeexplore.ieee.org/document/5075877 https://www.proquest.com/docview/195935321 https://www.proquest.com/docview/869842562 |
| Volume | 55 |
| WOSCitedRecordID | wos000267222000033&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVIEE databaseName: IEEE Electronic Library (IEL) customDbUrl: eissn: 1557-9654 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0014512 issn: 0018-9448 databaseCode: RIE dateStart: 19630101 isFulltext: true titleUrlDefault: https://ieeexplore.ieee.org/ providerName: IEEE |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3da9RAEB_a4oM-WG0V02rZB18E4-VzPx7r6akgVfSEvoX9mIWC5srlruB_70ySCxVF8CUEdsKGmZ3sTH6zvwF4TiZFFVRMpaFLpbFOXeTCtdwG4zV6ncW-2YS6uNCXl-bzHryczsIgYl98hq_4tsfyw8pv-VfZjGKXWiu1D_tKyeGs1oQYVHU-MIPn5MCUc-wgyczMlh-WAzElJfp5yZ3Nb21BfU8Vroi0HSklDt0s_vgw97vN4vD_3vMB3B-jSnE-LIOHsIftERzuOjaI0YGP4N4t-sFjOP_Uinc0eydsG8SbsTAGxXz985pixoGtRKyi-Lj4-iV9TftdEIxi2x9ifsV0BN0j-LZ4u5y_T8eWCqmnSGtD2WLQPreZsd5VvqxCJWOWueAKDCitZFg1Ro6hKh187n2MpSNJr-roKPQpH8NBu2rxCQivJCqsTe5IOESpa-eUjVVFJtYF2gRmOy03fuQb57YX35s-78hMQ3bhLpimGe2SwIvpieuBa-Mfsses90luVHkCZ78ZchpnonqZqSKB051lm9Fbu4YJdsq6LPIExDRKbsbYiW1xte0aLQ0DlrI4-fvEp3B3wJm4kPcpHGzWW3wGd_zN5qpbn_VL9Rc6beZB |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3da9RAEB9qK2gfWm0rjf1wH_oiGC8fm_14bK-eLV6vRU_oW9hPKGiuXO4E_3tnk1xoUQq-hMBO2DCzk53Jb_Y3ACdoUsct9zGTeKHCFbH2oXAtVVYa4YxIfNNsgk8m4vZW3qzBh_4sjHOuKT5zH8Ntg-XbmVmGX2UDjF0Kwfkz2CgozZL2tFaPGdAibbnBU3RhzDpWoGQiB9PLaUtNial-mofe5g82oaarSqiJVDWqxbf9LP76NDf7zWj7_970FWx1cSU5bRfCa1hz1Q5sr3o2kM6Fd2DzAQHhLpxeV-Qzzl4TVVly3pXGODKc_77HqLHlKyEzT8ajb1_jM9zxLAk4tvpJhneBkKDeg--jT9PhRdw1VYgNxloLzBetMKlKpDKampxaynySaKszZx1TLACr3ocoigprUmO8zzVKGl54jcFP_gbWq1nl9oEYzhx3hUw1ClvPRKE1V55SNLLInIpgsNJyaTrG8dD44kfZZB6JLNEuoQ-mLDu7RPC-f-K-Zdt4QnY36L2X61QewfEjQ_bjgaqeJTyL4GBl2bLz17oMFDt5kWdpBKQfRUcL6Imq3GxZl4LJAFmy7O2_J34HLy6mV-NyfDn5cgAvW9QplPUewvpivnRH8Nz8WtzV8-Nm2f4BWPbpiA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=On+Guess+and+Determine+Cryptanalysis+of+LFSR-Based+Stream+Ciphers&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=Pasalic%2C+E.&rft.date=2009-07-01&rft.pub=IEEE&rft.issn=0018-9448&rft.volume=55&rft.issue=7&rft.spage=3398&rft.epage=3406&rft_id=info:doi/10.1109%2FTIT.2009.2021316&rft.externalDocID=5075877 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon |