An Improved Attack on the Shrinking Generator

An Improved Attack on the Shrinking Generator

Proceedings of the 4th WSEAS Int. Conf. on Information Security, Communications and Computers, Tenerife, Spain, December 16-18, 2005 (pp197-200) An Improved Attack on the Shrinking Generator P. CABALLERO-GIL1 AND A. FÚSTER-SABATER2 1Department of Statistics, Operations Research and Computation University of La Laguna 38271 Tenerife SPAIN [email protected] 2 Institute of Applied Physics Spanish Higher Council for Scientific Research Serrano144, 28006 Madrid SPAIN [email protected] Abstract: - This work proposes a known-plaintext attack on the Shrinking Generator through its characterization by means of Cellular Automata. It is based on the computation of the characteristic polynomials of sub-automata and on the generation of the Galois field associated to one of the Linear Feedback Shift Registers components of the generator. The proposed algorithm allows predicting a large number of unseen bits of the keystream sequence, thanks to the knowledge of both registers lengths, the characteristic polynomial of one of the registers, and some keystream bits. Key-Words: - Cellular automata, cryptanalysis, stream cipher, shrinking generator 1 Introduction correlation attack based on searching specific Stream ciphers may be generally defined as simple subsequences of the output sequence was introduced bitwise additions between the plaintext stream and the in [5]. More recently, a distinguishing attack running keystream, [1]. Nonlinear combinations of applicable when the second LFSR has a low-weight Linear Feedback Shift Registers (LFSRs) are the most feedback polynomial was investigated in [6]. frequently used running key generators because if they However, despite all these attacks, the SG continues are properly designed, keystream sequences easily being considered resistant against efficient exhibit some ideal characteristics such as long period cryptanalysis. and balanced statistics. However, in general it is much Cellular Automata (CA) are discrete more difficult to guarantee their unpredictability. mathematical models in which a lattice of finite state From a cryptanalysis point of view, stream ciphers machines, called cells, updates itself synchronously must be resistant against known-plaintext attacks. In according to local rules, [7]. Because of their these attacks, it is assumed that cryptanalysts may simplicity, regularity, modularity and cascadable intercept some bits of the keystream, and their goal is structure with local neighbourhood, CA are ideally to get some information about the seed of the suited for VLSI implementation. CA have been keystream generator or about the unseen keystream proposed both for secret and public key cryptography bits, faster than exhaustive search of all possible keys. [8], [9], [10]. Also cryptanalysis of certain CA based The Shrinking Generator (SG) is a nonlinear keystream generators have been published [11], [12]. combinator based on two LFSRs so that the bits of one Two different works have explored the use of CA as output are used to determine whether the models for predicting pseudorandom binary corresponding bits of the second output are used as sequences. In [13], a Cellular Automata-Based model part of the overall keystream, [2]. SGs are simple and for the Shrinking Generator was proposed. Such a scalable generators that produce pseudorandom work may be considered the starting point of this sequences with good security properties. There have research. been several approaches for attacking the SG. A basic The structure of this work is as follows. Next divide-and-conquer attack requiring an exhaustive section gives relevant background about the basic search through all the possible initial states and structures we are dealing with: Linear Hybrid Cellular feedback polynomials of the selector LFSR was Automata and Shrinking Generators. The model for proposed in [3]. The authors of [4] described a the Shrinking Generator that is used in this work is correlation attack targeting the second LFSR. A described next. Sections 3 and 4 introduce the Research supported by the Spanish Ministry of Education and Science and the European FEDER Fund under Projects SEG2004-04352-C04-03 and SEG2004-02418 Proceedings of the 4th WSEAS Int. Conf. on Information Security, Communications and Computers, Tenerife, Spain, December 16-18, 2005 (pp197-200) theoretical basis of the proposed CA-based It has been established that the maximum length cryptanalysis of the SG and the full description of the cycle can be produced only if the characteristic algorithm, respectively. Finally, in Section 5 several polynomial is primitive as well as only if rule 90 conclusions and open questions are drawn. and/or rule 150 is used to construct the CA, [16]. On the other hand, the authors of [17] examined the 2 Preliminaries concatenating maximum length CA to obtain longer or Cellular automata are finite state machines that consist smaller ones maintaining that property. In this of arrays of n cells. According to local interaction research only one-dimensional 90/150 null LHCA are rules, the cells are updated synchronously in discrete considered. Binary string R1 R2 ... Rn are here used to time steps. The state of a particular cell at the next time represent n-cell LHCA, where Ri is either 0, if cell i step is determined by the current states of a uses rule 90, or 1, if cell i uses rule 150. surrounding neighbourhood of cells. The transitions Given an irreducible polynomial, several are usually specified in the form of a rule table that algorithms have been developed to find its defines the cell's next state for each possible corresponding LHCA. The most recent one, proposed neighbourhood configuration. in [16], applies the Euclidean algorithm to compute The simplest nontrivial CA are binary and the LHCA in a polynomial running time, so it is one-dimensional, with two possible states per cell and sufficiently fast to generate LHCA for polynomials of a cell's neighbours defined as the cell on either side of very large degree. it. These automata were called elementary cellular On the other hand, in [18], a synthesis algorithm automata] by Wolfram, who studied extensively their based also on the Euclidean algorithm which allows properties [14]. A cell and its two neighbours make computing in linear time the characteristic polynomial out a neighbourhood of 3 cells, so there are 8 possible for any given LHCA was introduced. In this work such patterns, and 256 possible rules. These 256 CAs are an algorithm will be called Polynomial-Synthesis generally referred to using a standard naming Algorithm. When the characteristic polynomial of a convention invented by Wolfram. The name of a CA is CA is primitive, the sequence produced by any cell of a decimal number which, in binary, gives the rule the CA can be obtained from phase shift of any other table. For example, according to rule 90, the value of a sequence produced from another cell of the same CA, particular cell i is the sum modulo 2 of the values of its [19]. The converse may not be true. two neighbours cells on the previous time step t. Rule The shrinking generator was introduced by 150 also includes the value of cell i at time step t. Coppersmith, Krawczyk, and Mansour [2]. The SG is Null CA are those where cells with permanent a well-known keystream generator composed of two null content are supposed adjacent to the extreme cells LFSRs: a selector register that produces a sequence of the CA. Binary CA where the neighbourhood used to decimate the sequence generated by the other dependence is just on XOR operations are called linear register. The selector register is here denoted by S, its CA. In [15] it was shown that a three-neighborhood length is LS, its characteristic polynomial is PS(x) and linear CA can be represented by a tridiagonal the sequence it produces is {si}. The decimated characteristic matrix - a matrix which has the elements sequence is denoted {ai}, the second register that of its diagonal and two off-diagonals as non-zero. If in produces it is A, its length is LA and its characteristic a CA different rules are applied over different cells, polynomial is PA(x).So, the shrunken sequence {zj} then it is called a hybrid CA. Linear Hybrid Cellular may be defined according to the following rule: Automata are usually denoted with the acronyms if si=1 then zj=ai LHCA. if si=0 then ai is discarded The matrix algebraic tool employing minimal Despite its simplicity, the SG has remained and characteristic polynomials of the characteristic remarkably resistant to cryptanalysis because there are matrix showed various interesting features of CA no known attacks that are feasible if both LFSRs are behaviour. The first important finding was the too long for exhaustive search. categorization of linear CA into group and non-group CA. In a group CA each of the states has a single 3 The CA-Model for the Shrinking predecessor which is not true for non-group CA. The Generator most effective application of null group CA has been In this work we consider the linear model of the proposed in the field of pseudorandom pattern SG described in [13] in terms of LHCA. The generation, since the authors of [18] showed that equivalent LHCA obtained for any SG through the maximum length CA - group CA with all non-zero algorithm described there and here denoted states lying in a single cycle - produce high quality CA-Synthesis Algorithm, are formed by pseudorandom patterns. Proceedings of the 4th WSEAS Int. Conf. on Information Security, Communications and Computers, Tenerife, Spain, December 16-18, 2005 (pp197-200) concatenations of basic primitive LHCA and their additive and the equivalent LHCA is null boundary, mirror images, with one or two modifications for any rule Ri, the previous reconstruction is made (complementations of rules) in each LHCA thanks to sums of some elements of the shrunken component.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    5 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us