On Guess and Determine Cryptanalysis of LFSR-Based Stream Ciphers

In this paper, the complexity of applying a guess and determine attack to so-called Linear Feedback Shift register (LFSR)-based stream ciphers is analyzed. This family of stream ciphers uses a single or several LFSR and a filtering function F : GF(2) n rarr GF(2) m to generate the blocks of m ges 1...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:IEEE transactions on information theory Ročník 55; číslo 7; s. 3398 - 3406
Hlavný autor: Pasalic, E.
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: New York, NY IEEE 01.07.2009
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Predmet:
ISSN:0018-9448, 1557-9654
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract In this paper, the complexity of applying a guess and determine attack to so-called Linear Feedback Shift register (LFSR)-based stream ciphers is analyzed. This family of stream ciphers uses a single or several LFSR and a filtering function F : GF(2) n rarr GF(2) m to generate the blocks of m ges 1 keystream bits at the time. In difference to a classical guess and determine attack, a method based on guessing certain bits in order to determine the remaining secret key/state bits, our approach efficiently takes advantage of the reduced preimage space for relatively large m and at the same time employing the design structure of the cipher. Several variations of the algorithm are derived to circumvent the sensitivity of attack to the input data, n, m and the key length. In certain cases, our attack outperforms classical algebraic attacks; these being considered as one of the most efficient cryptanalyst tools for this type of ciphers. A superior performance of our attack over algebraic attacks is demonstrated in case the filtering function belongs to the extended Maiorana-McFarland class.
AbstractList In this paper, the complexity of applying a guess and determine attack to so-called Linear Feedback Shift register (LFSR)-based stream ciphers is analyzed. This family of stream ciphers uses a single or several LFSR and a filtering function F : GF(2) super(n) rarr GF(2) super(m) to generate the blocks of m ges 1 keystream bits at the time. In difference to a classical guess and determine attack, a method based on guessing certain bits in order to determine the remaining secret key/state bits, our approach efficiently takes advantage of the reduced preimage space for relatively large m and at the same time employing the design structure of the cipher. Several variations of the algorithm are derived to circumvent the sensitivity of attack to the input data, n, m and the key length. In certain cases, our attack outperforms classical algebraic attacks; these being considered as one of the most efficient cryptanalyst tools for this type of ciphers. A superior performance of our attack over algebraic attacks is demonstrated in case the filtering function belongs to the extended Maiorana-McFarland class.
In this paper, the complexity of applying a guess and determine attack to so-called Linear Feedback Shift register (LFSR)-based stream ciphers is analyzed. This family of stream ciphers uses a single or several LFSR and a filtering function $F:{hbox{GF}},(2)^n rightarrow {hbox{GF}},(2)^m$ to generate the blocks of $m geq 1$ keystream bits at the time. In difference to a classical guess and determine attack, a method based on guessing certain bits in order to determine the remaining secret key/state bits, our approach efficiently takes advantage of the reduced preimage space for relatively large $m$ and at the same time employing the design structure of the cipher. Several variations of the algorithm are derived to circumvent the sensitivity of attack to the input data, $n,m$ and the key length. In certain cases, our attack outperforms classical algebraic attacks ; these being considered as one of the most efficient cryptanalyst tools for this type of ciphers. A superior performance of our attack over algebraic attacks is demonstrated in case the filtering function belongs to the extended Maiorana-McFarland class. [PUBLICATION ABSTRACT]
In this paper, the complexity of applying a guess and determine attack to so-called Linear Feedback Shift register (LFSR)-based stream ciphers is analyzed. This family of stream ciphers uses a single or several LFSR and a filtering function F : GF(2) n rarr GF(2) m to generate the blocks of m ges 1 keystream bits at the time. In difference to a classical guess and determine attack, a method based on guessing certain bits in order to determine the remaining secret key/state bits, our approach efficiently takes advantage of the reduced preimage space for relatively large m and at the same time employing the design structure of the cipher. Several variations of the algorithm are derived to circumvent the sensitivity of attack to the input data, n, m and the key length. In certain cases, our attack outperforms classical algebraic attacks; these being considered as one of the most efficient cryptanalyst tools for this type of ciphers. A superior performance of our attack over algebraic attacks is demonstrated in case the filtering function belongs to the extended Maiorana-McFarland class.
Author Pasalic, E.
Author_xml – sequence: 1
  givenname: E.
  surname: Pasalic
  fullname: Pasalic, E.
  organization: IMFM, Ljubljana
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=21826072$$DView record in Pascal Francis
BookMark eNp9kE1rGzEQhkVxoY7be6GXpRB62kTfKx0dp3ENBkPjnoVWO6Iya60rrQ_-95Gx8SGHXmYYeN4Z6blDkzhEQOgrwQ-EYP24XW0fKMa6FEoYkR_QlAjR1FoKPkFTjImqNefqE7rLeVdGLgidovkmVssj5FzZ2FXPMELahwjVIp0Oo422P-WQq8FX65fX3_WTzdBVr2MCu68W4fAXUv6MPnrbZ_hy7TP05-XndvGrXm-Wq8V8XTsm6Fhz3ClHLNbWtdwx3nHpMW67lkIH0kpFNfaecCa46hxxznvWFtI1wreCCDZDPy57D2n4V148mn3IDvreRhiO2SipFadC0kJ-f0fuhmMqf8mGaKGZYMXQDN1fIZud7X2y0YVsDinsbToZShSVuDkvwxfOpSHnBP6GEGzO5k0xb87mzdV8ich3ERdGO4YhjsmG_n_Bb5dgAIDbHYEboZqGvQG0PpCN
CODEN IETTAW
CitedBy_id crossref_primary_10_1007_s12095_025_00791_w
crossref_primary_10_1016_j_cnsns_2012_12_018
crossref_primary_10_1109_TIM_2019_2909248
crossref_primary_10_1007_s11704_020_0182_y
crossref_primary_10_1109_TII_2022_3151984
crossref_primary_10_3233_JHS_222024
crossref_primary_10_1007_s42979_024_02768_7
crossref_primary_10_1007_s10998_012_4631_8
crossref_primary_10_1038_s41598_024_75373_6
crossref_primary_10_1016_j_ins_2017_06_036
crossref_primary_10_1016_j_dsp_2013_11_004
crossref_primary_10_1016_j_aeue_2023_154835
crossref_primary_10_1049_iet_ifs_2012_0169
crossref_primary_10_1109_TIT_2011_2179006
Cites_doi 10.1007/978-3-540-45146-4_10
10.1007/978-3-540-31815-6_26
10.1109/TIR.2002.800492
10.1007/s10623-004-3995-z
10.1007/3-540-44598-6_31
10.1109/TIT.2002.807297
10.1109/TC.2003.1190582
10.1007/3-540-48405-1_13
10.1007/978-3-540-25937-4_5
10.1007/11496618_3
10.1007/3-540-44448-3_1
10.1007/11761679_10
10.1007/BF02252874
10.1109/18.623184
10.1007/978-3-540-24676-3_28
10.1109/TC.1985.1676518
10.1007/978-3-540-45146-4_11
10.1109/TIT.2004.833366
10.1109/TIT.2004.839524
10.1109/TIT.1969.1054260
10.1007/11941378_17
ContentType Journal Article
Copyright 2009 INIST-CNRS
Copyright Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jul 2009
Copyright_xml – notice: 2009 INIST-CNRS
– notice: Copyright Institute of Electrical and Electronics Engineers, Inc. (IEEE) Jul 2009
DBID 97E
RIA
RIE
AAYXX
CITATION
IQODW
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
DOI 10.1109/TIT.2009.2021316
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Pascal-Francis
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ANTE: Abstracts in New Technology & Engineering
Engineering Research Database
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
Engineering Research Database
ANTE: Abstracts in New Technology & Engineering
DatabaseTitleList Technology Research Database
Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
Applied Sciences
EISSN 1557-9654
EndPage 3406
ExternalDocumentID 1753191561
21826072
10_1109_TIT_2009_2021316
5075877
Genre orig-research
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABFSI
ABQJQ
ABVLG
ACGFO
ACGFS
ACGOD
ACIWK
AENEX
AETEA
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
E.L
EBS
EJD
F5P
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IDIHD
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
PQQKQ
RIA
RIE
RNS
RXW
TAE
TN5
VH1
VJK
AAYXX
CITATION
IQODW
RIG
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
F28
FR3
ID FETCH-LOGICAL-c352t-40d8c1a09acb4c34d46f00bdb2ede6a68290ff143548dc1ccff3bb4cc75fb5153
IEDL.DBID RIE
ISICitedReferencesCount 22
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000267222000033&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0018-9448
IngestDate Sun Sep 28 00:18:30 EDT 2025
Sun Nov 09 08:40:14 EST 2025
Mon Jul 21 09:17:00 EDT 2025
Sat Nov 29 03:53:07 EST 2025
Tue Nov 18 22:30:38 EST 2025
Tue Aug 26 16:47:33 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 7
Keywords Performance evaluation
Filtering
Stream ciphering
Algebraic immunity
guess and determine
filter state guessing attack
Boolean function
stream ciphers
Algorithm
annihilators
Shift register
filtering generator
Private key
Algebraic attacks
linear feedback shift register (LFSR)
nonlinear combiner
Security of data
Cryptanalysis
Secret key
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
CC BY 4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c352t-40d8c1a09acb4c34d46f00bdb2ede6a68290ff143548dc1ccff3bb4cc75fb5153
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ObjectType-Article-2
ObjectType-Feature-1
content type line 23
PQID 195935321
PQPubID 36024
PageCount 9
ParticipantIDs crossref_primary_10_1109_TIT_2009_2021316
crossref_citationtrail_10_1109_TIT_2009_2021316
proquest_miscellaneous_869842562
ieee_primary_5075877
proquest_journals_195935321
pascalfrancis_primary_21826072
PublicationCentury 2000
PublicationDate 2009-07-01
PublicationDateYYYYMMDD 2009-07-01
PublicationDate_xml – month: 07
  year: 2009
  text: 2009-07-01
  day: 01
PublicationDecade 2000
PublicationPlace New York, NY
PublicationPlace_xml – name: New York, NY
– name: New York
PublicationTitle IEEE transactions on information theory
PublicationTitleAbbrev TIT
PublicationYear 2009
Publisher IEEE
Institute of Electrical and Electronics Engineers
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: Institute of Electrical and Electronics Engineers
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref15
menezes (ref24) 1997
ref31
meier (ref22) 2004; lncs 3027
ref11
ref32
gupta (ref14) 2005; lncs 3325
(ref12) 0
ref2
kurosawa (ref19) 1997; 3
ref18
courtois (ref8) 2005; lncs 3506
armknecht (ref1) 2004; lncs 3017
hong (ref16) 2005; lncs 3788
courtois (ref10) 2003; lncs 2656
tarannikov (ref30) 2000; lncs 1977
ref23
ref26
ref20
ref21
chepyzhov (ref6) 1991; lncs 547
ref28
ref27
goli (ref13) 1997; lncs 1233
armknecht (ref3) 2003; lncs 2729
ref29
nyberg (ref25) 1992; lncs 658
johansson (ref17) 1999; lncs 1592
ref4
ref5
courtois (ref7) 2003; lncs 2729
courtois (ref9) 2005; lncs 3935
References_xml – year: 0
  ident: ref12
  publication-title: ECRYPT Call for Stream Cipher Primitives
– volume: lncs 1592
  start-page: 347
  year: 1999
  ident: ref17
  publication-title: Advances CryptologyEurocrypt
– volume: lncs 2729
  start-page: 162
  year: 2003
  ident: ref3
  publication-title: Advances in CryptologyCRYPTO 2003
  doi: 10.1007/978-3-540-45146-4_10
– volume: lncs 3325
  start-page: 317
  year: 2005
  ident: ref14
  publication-title: Information Security Applications
  doi: 10.1007/978-3-540-31815-6_26
– year: 1997
  ident: ref24
  publication-title: Handbook of Applied Cryptography
– ident: ref26
  doi: 10.1109/TIR.2002.800492
– volume: lncs 1233
  start-page: 239
  year: 1997
  ident: ref13
  publication-title: Advances in Cryptology?EUROCRYPT 97
– volume: lncs 547
  start-page: 176
  year: 1991
  ident: ref6
  publication-title: Advances in CryptologyEUROCRYPT'91
– ident: ref5
  doi: 10.1007/s10623-004-3995-z
– ident: ref31
  doi: 10.1007/3-540-44598-6_31
– ident: ref18
  doi: 10.1109/TIT.2002.807297
– ident: ref27
  doi: 10.1109/TC.2003.1190582
– ident: ref20
  doi: 10.1007/3-540-48405-1_13
– volume: lncs 3017
  start-page: 65
  year: 2004
  ident: ref1
  publication-title: Fast Software Encryption 2004
  doi: 10.1007/978-3-540-25937-4_5
– volume: lncs 3506
  start-page: 3
  year: 2005
  ident: ref8
  article-title: algebraic attacks on combiner with memory and several outputs
  publication-title: Proc Int Conf Inf Security Cryptol ICISC 2004
  doi: 10.1007/11496618_3
– volume: lncs 658
  start-page: 92
  year: 1992
  ident: ref25
  publication-title: Advances in Cryptology?EUROCRYPT 92
– ident: ref4
  doi: 10.1007/3-540-44448-3_1
– volume: lncs 3935
  start-page: 261
  year: 2005
  ident: ref9
  publication-title: Information Security and Cryptology
– ident: ref2
  doi: 10.1007/11761679_10
– ident: ref23
  doi: 10.1007/BF02252874
– ident: ref32
  doi: 10.1109/18.623184
– volume: lncs 3027
  start-page: 474
  year: 2004
  ident: ref22
  publication-title: Advances in CryptologyEUROCRYPT 2004
  doi: 10.1007/978-3-540-24676-3_28
– volume: lncs 3788
  start-page: 353
  year: 2005
  ident: ref16
  publication-title: ASIACRYPT
– ident: ref29
  doi: 10.1109/TC.1985.1676518
– volume: lncs 2729
  start-page: 176
  year: 2003
  ident: ref7
  publication-title: Advances in CryptologyCRYPTO 2003
  doi: 10.1007/978-3-540-45146-4_11
– volume: lncs 2656
  start-page: 346
  year: 2003
  ident: ref10
  publication-title: Advances in CryptologyEUROCRYPT 2003
– ident: ref28
  doi: 10.1109/TIT.2004.833366
– volume: 3
  start-page: 721
  year: 1997
  ident: ref19
  article-title: highly nonlinear -resilient functions
  publication-title: J Univ Comp Sci
– volume: lncs 1977
  start-page: 19
  year: 2000
  ident: ref30
  publication-title: Proc Indocrypt
– ident: ref15
  doi: 10.1109/TIT.2004.839524
– ident: ref21
  doi: 10.1109/TIT.1969.1054260
– ident: ref11
  doi: 10.1007/11941378_17
SSID ssj0014512
Score 2.0971835
Snippet In this paper, the complexity of applying a guess and determine attack to so-called Linear Feedback Shift register (LFSR)-based stream ciphers is analyzed....
SourceID proquest
pascalfrancis
crossref
ieee
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 3398
SubjectTerms Algebra
Algebraic attacks
Algebraic immunity
Algorithms
annihilators
Applied sciences
Boolean function
Boolean functions
Complexity
Cryptography
Detection, estimation, filtering, equalization, prediction
Exact sciences and technology
filter state guessing attack
Filtering
filtering generator
Filtration
guess and determine
Hardware
Information processing
Information theory
Information, signal and communications theory
linear feedback shift register (LFSR)
Linear feedback shift registers
nonlinear combiner
Nonlinear filters
Protection
Security
Signal and communications theory
Signal, noise
stream ciphers
Streams
Telecommunications and information theory
Throughput
Title On Guess and Determine Cryptanalysis of LFSR-Based Stream Ciphers
URI https://ieeexplore.ieee.org/document/5075877
https://www.proquest.com/docview/195935321
https://www.proquest.com/docview/869842562
Volume 55
WOSCitedRecordID wos000267222000033&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVIEE
  databaseName: IEEE Electronic Library (IEL)
  customDbUrl:
  eissn: 1557-9654
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0014512
  issn: 0018-9448
  databaseCode: RIE
  dateStart: 19630101
  isFulltext: true
  titleUrlDefault: https://ieeexplore.ieee.org/
  providerName: IEEE
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3da9RAEB_a4oM-WG0V02rZB18E4-VzPx7r6akgVfSEvoX9mIWC5srlruB_70ySCxVF8CUEdsKGmZ3sTH6zvwF4TiZFFVRMpaFLpbFOXeTCtdwG4zV6ncW-2YS6uNCXl-bzHryczsIgYl98hq_4tsfyw8pv-VfZjGKXWiu1D_tKyeGs1oQYVHU-MIPn5MCUc-wgyczMlh-WAzElJfp5yZ3Nb21BfU8Vroi0HSklDt0s_vgw97vN4vD_3vMB3B-jSnE-LIOHsIftERzuOjaI0YGP4N4t-sFjOP_Uinc0eydsG8SbsTAGxXz985pixoGtRKyi-Lj4-iV9TftdEIxi2x9ifsV0BN0j-LZ4u5y_T8eWCqmnSGtD2WLQPreZsd5VvqxCJWOWueAKDCitZFg1Ro6hKh187n2MpSNJr-roKPQpH8NBu2rxCQivJCqsTe5IOESpa-eUjVVFJtYF2gRmOy03fuQb57YX35s-78hMQ3bhLpimGe2SwIvpieuBa-Mfsses90luVHkCZ78ZchpnonqZqSKB051lm9Fbu4YJdsq6LPIExDRKbsbYiW1xte0aLQ0DlrI4-fvEp3B3wJm4kPcpHGzWW3wGd_zN5qpbn_VL9Rc6beZB
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3da9RAEB9qK2gfWm0rjf1wH_oiGC8fm_14bK-eLV6vRU_oW9hPKGiuXO4E_3tnk1xoUQq-hMBO2DCzk53Jb_Y3ACdoUsct9zGTeKHCFbH2oXAtVVYa4YxIfNNsgk8m4vZW3qzBh_4sjHOuKT5zH8Ntg-XbmVmGX2UDjF0Kwfkz2CgozZL2tFaPGdAibbnBU3RhzDpWoGQiB9PLaUtNial-mofe5g82oaarSqiJVDWqxbf9LP76NDf7zWj7_970FWx1cSU5bRfCa1hz1Q5sr3o2kM6Fd2DzAQHhLpxeV-Qzzl4TVVly3pXGODKc_77HqLHlKyEzT8ajb1_jM9zxLAk4tvpJhneBkKDeg--jT9PhRdw1VYgNxloLzBetMKlKpDKampxaynySaKszZx1TLACr3ocoigprUmO8zzVKGl54jcFP_gbWq1nl9oEYzhx3hUw1ClvPRKE1V55SNLLInIpgsNJyaTrG8dD44kfZZB6JLNEuoQ-mLDu7RPC-f-K-Zdt4QnY36L2X61QewfEjQ_bjgaqeJTyL4GBl2bLz17oMFDt5kWdpBKQfRUcL6Imq3GxZl4LJAFmy7O2_J34HLy6mV-NyfDn5cgAvW9QplPUewvpivnRH8Nz8WtzV8-Nm2f4BWPbpiA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=On+Guess+and+Determine+Cryptanalysis+of+LFSR-Based+Stream+Ciphers&rft.jtitle=IEEE+transactions+on+information+theory&rft.au=Pasalic%2C+E.&rft.date=2009-07-01&rft.pub=IEEE&rft.issn=0018-9448&rft.volume=55&rft.issue=7&rft.spage=3398&rft.epage=3406&rft_id=info:doi/10.1109%2FTIT.2009.2021316&rft.externalDocID=5075877
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9448&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9448&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9448&client=summon