首页> 外文会议>2011 7th International Conference on Emerging Technologies >Efficient implementation of linearisation attacks on F-FCSR-16 type key-stream generators
【24h】

Efficient implementation of linearisation attacks on F-FCSR-16 type key-stream generators

机译:在F-FCSR-16型密钥流生成器上有效实施线性化攻击

获取原文

摘要

Feedback with Carry Shift Registers (FCSRs) are being explored as a potential replacement of Linear Feedback Shift Registers (LFSRs) in the design of stream ciphers. Many cryptographic schemes based on FCSRs have been proposed in the open literature. The most efficient attack against ciphers based on FCSRs are ‘linearisation attacks’, which consists of three variants, namely ‘Conventional Linearisation Attacks (CLAs)’, ‘Fast Linearisation Attacks (FLAs)’ and ‘Improved Linearisation Attacks (ILAs)’. This paper describes applications of linearisation attacks on F-FCSR-16 key-stream generator. For this purpose, the paper presents State Recovery Algorithms (SRAs) based on CLAs, FLAs and ILAs for F-FCSR-16. The paper also presents efficient techniques of implementation for these attacks on F-FCSR-16 type key-stream generators. Further more, the paper also presents a comparative analysis of the results of CLAs, FLAs and ILAs on F-FCSR-16 key-stream generator. This analysis shows the trade-offs between CLAs, FLAs and ILAs in terms of data time and memory complexities, when compared with each other and determines the relative efficiency of these attacks on F-FCSR-16.
机译:正在研究带进位移位寄存器(FCSR)的反馈,作为流密码设计中线性反馈移位寄存器(LFSR)的潜在替代。在公开文献中已经提出了许多基于FCSR的密码方案。针对基于FCSR的密码的最有效的攻击是“线性化攻击”,它由三个变体组成,即“常规线性化攻击(CLA)”,“快速线性化攻击(FLA)”和“改进的线性化攻击(ILA)”。本文介绍了线性化攻击在F-FCSR-16密钥流生成器上的应用。为此,本文提出了基于F-FCSR-16的CLA,FLA和ILA的状态恢复算法(SRA)。本文还介绍了针对F-FCSR-16型密钥流生成器的这些攻击的有效实现技术。此外,本文还对F-FCSR-16密钥流生成器上的CLA,FLA和ILA的结果进行了比较分析。此分析表明,在相互比较时,CLA,FLA和ILA之间在数据时间和内存复杂性方面进行了权衡,并确定了这些攻击对F-FCSR-16的相对效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号