Authors:
            
                    Guanhan Chew
                    
                        
                    
                    ; 
                
                    Aileen Zhang
                    
                        
                    
                     and
                
                    Khoongming Khoo
                    
                        
                    
                    
                
        
        
            Affiliation:
            
                    
                        
                    
                    DSO National Laboratories, Singapore
                
        
        
        
        
        
             Keyword(s):
            Stream Ciphers, Resynchronization Attacks, Maiorana-McFarland Functions, Cube Attack.
        
        
            
                Related
                    Ontology
                    Subjects/Areas/Topics:
                
                        Cryptographic Techniques and Key Management
                    ; 
                        Data and Systems Security
                    ; 
                        Information and Systems Security
                    ; 
                        Smart Card Security
                    
            
        
        
            
                Abstract: 
                In this paper, we present an extension to the resynchronization attack on stream ciphers of (Daemen et al., 1993). The most general attack in (Daemen et al., 1993) on a nonlinearly filtered register with linear resync has attack complexity ⌈n---- ⌉×2-----, where n is the key length and ---- the input size of the filter function. It was further shown specifically that the attack complexity can be reduced in the case when the filter function is a multiplexer. The attack of (Daemen et al., 1993) is most efficient when the input size is small. We shall show that a large input size may not necessarily guard against this attack, even when a function with good cryptographic properties is used. It may decrease the attack complexity, in the example illustrated in this paper. Boolean functions from the Maiorana-McFarland class make good choices for these filter functions due to their good cryptographic properties such as balance, high nonlinearity and high order of resiliency. However, these f
                unctions can become linear when certain input bits are fixed. We shall demonstrate this weakness and use it to achieve lower attack complexities for the general resynchronization attack of (Daemen et al., 1993).
                (More)