New Attack Strategy for the Shrinking Generator

Pino Caballero-Gil, Amparo Fúster-Sabater, M. Eugenia Pazo-Robles

Abstract

This work shows that the cryptanalysis of the shrinking generator requires fewer intercepted bits than what indicated by the linear complexity. Indeed, whereas the linear complexity of shrunken sequences is between A • 2(S−2) and A • 2(S−1), we claim that the initial states of both component registers are easily computed with fewer than A • S shrunken bits. Such a result is proven thanks to the definition of shrunken sequences as interleaved sequences. Consequently, it is conjectured that this statement can be extended to all interleaved sequences. Furthermore, this paper confirms that certain bits of the interleaved sequences have a greater strategic importance than others, which must be considered as a proof of weakness of interleaved generators.

References

  1. T. Beth, F. Piper, The Stop-and-Go Generator, in Proceedings of EUROCRYPT'84, in: Lecture Notes in Computer Science, vol. 228, Springer Verlag, 1985, pp. 228-238.
  2. Bluetooth, Specifications of the Bluetooth system,, available at http://www.bluetooth.com/
  3. P. Caballero-Gil, A. F úster-Sabater, A Wide Family of Nonlinear Filter Functions with a Large Linear Span, Information Sciences, 164 (2004) 197-207.
  4. P. Caballero-Gil, A. F úster-Sabater, Using Linear Hybrid Cellular Automata to Attack the Shrinking Generator, IEICE Transactions on Fundamentals of Electronics Communications and Computer, E89-A (2006) 1166-1172.
  5. D. Coppersmith, H. Krawczyk, H. Mansour, The Shrinking Generator, in Proceedings of CRYPTO'93, in: Lecture Notes in Computer Science, vol. 773, Springer-Verlag, 1994, pp. 22-39.
  6. A. F úster-Sabater, Run Distribution in Nonlinear Binary Generators, Applied Mathematics Letters 17 (2004) 1427-1432.
  7. D. Gollmann, W.G. Chambers, Clock-Controlled Shift Register, IEEE J. Selected Areas Commun 7 (1989) 525-533.
  8. S.W. Golomb, Shift Register-Sequences, Aegean Park Press, Laguna Hill, 1982.
  9. G. Gong, Theory and Applications of q-ary Interleaved Sequences, IEEE Trans. Information Theory 41 (2) (1995) 400-411.
  10. GSM, Global Systems for Mobile Communications, available at http://cryptome.org/gsma512.htm
  11. S.M. Jennings, Multiplexed Sequences: Some Properties, in Proceedings of EUROCRYPT'83, in: Lecture Notes in Computer Science, vol. 149, Springer Verlag, 1983, pp. 210-221.
  12. S. Jiang, Z. Dai and G. Gong. On interleaved sequences over finite fields. Discrete Maths, 252 (2002) 161-178.
  13. A. Kanso, Clock-Controlled Shrinking Generator of Feedback Shift Registers, in: Lecture Notes in Computer Science, vol. 2727, Springer Verlag, 2003, pp. 443-451.
  14. R. Lidl, H. Niederreiter, Introduction to Finite Fields and Their Applications, Cambridge University Press, 1986.
  15. R.L. Rivest, RSA Data Security, Inc., March 12, 1998.
  16. I. Shparlinski, On Some Properties of the Shrinking Generator, Designs, Codes and Cryptography 23 (2001) 147-156.
  17. L. Simpsom, J. Golic, E. Dawson, A Probabilistic Correlation Attack on the Shrinking Generator, in Proceedings of EUROCRYPT'98, in: Lecture Notes in Computer Science, vol. 1438, Springer Verlag, 1998, pp. 147-158.
Download


Paper Citation


in Harvard Style

Caballero-Gil P., Fúster-Sabater A. and Pazo-Robles M. (2008). New Attack Strategy for the Shrinking Generator . In Proceedings of the 6th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2008) ISBN 978-989-8111-44-9, pages 59-67. DOI: 10.5220/0001735200590067


in Bibtex Style

@conference{wosis08,
author={Pino Caballero-Gil and Amparo Fúster-Sabater and M. Eugenia Pazo-Robles},
title={New Attack Strategy for the Shrinking Generator},
booktitle={Proceedings of the 6th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2008)},
year={2008},
pages={59-67},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001735200590067},
isbn={978-989-8111-44-9},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 6th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2008)
TI - New Attack Strategy for the Shrinking Generator
SN - 978-989-8111-44-9
AU - Caballero-Gil P.
AU - Fúster-Sabater A.
AU - Pazo-Robles M.
PY - 2008
SP - 59
EP - 67
DO - 10.5220/0001735200590067