{"title":"基于fcsr的流密码线性化攻击的软件仿真","authors":"A. Ali","doi":"10.1109/IBCAST.2013.6512148","DOIUrl":null,"url":null,"abstract":"Feedback with Carry Shift Registers (FCSRs) are being explored for their usage as building blocks in stream ciphers. Linearisation attacks are most effective attacks on a class of FCSR-based stream ciphers, which use filtered Galois FCSRs as building blocks. This paper presents techniques for software simulation of these attacks on such ciphers. In order to describe these techniques, the paper uses a small scale variant of the F-FCSR-H v2 type keystream generators, which is known as T-cipher. The paper uses the pseudorandom keystream generator of the T-cipher to develop a statistical analysis. The paper uses this analysis to demonstrate various aspects of the implementation of linearisation attacks on such ciphers. Moreover the paper presents a pseudocode algorithm along with its implementation details for computing the success characteristics of linearisation attacks. The paper also presents enumeration and pseudocode algorithms for solving systems of polynomial equations in the finite field F2.","PeriodicalId":276834,"journal":{"name":"Proceedings of 2013 10th International Bhurban Conference on Applied Sciences & Technology (IBCAST)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"On software simulation of linearisation attacks on FCSR-based stream ciphers\",\"authors\":\"A. Ali\",\"doi\":\"10.1109/IBCAST.2013.6512148\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Feedback with Carry Shift Registers (FCSRs) are being explored for their usage as building blocks in stream ciphers. Linearisation attacks are most effective attacks on a class of FCSR-based stream ciphers, which use filtered Galois FCSRs as building blocks. This paper presents techniques for software simulation of these attacks on such ciphers. In order to describe these techniques, the paper uses a small scale variant of the F-FCSR-H v2 type keystream generators, which is known as T-cipher. The paper uses the pseudorandom keystream generator of the T-cipher to develop a statistical analysis. The paper uses this analysis to demonstrate various aspects of the implementation of linearisation attacks on such ciphers. Moreover the paper presents a pseudocode algorithm along with its implementation details for computing the success characteristics of linearisation attacks. The paper also presents enumeration and pseudocode algorithms for solving systems of polynomial equations in the finite field F2.\",\"PeriodicalId\":276834,\"journal\":{\"name\":\"Proceedings of 2013 10th International Bhurban Conference on Applied Sciences & Technology (IBCAST)\",\"volume\":\"13 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-05-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of 2013 10th International Bhurban Conference on Applied Sciences & Technology (IBCAST)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IBCAST.2013.6512148\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of 2013 10th International Bhurban Conference on Applied Sciences & Technology (IBCAST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IBCAST.2013.6512148","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
On software simulation of linearisation attacks on FCSR-based stream ciphers
Feedback with Carry Shift Registers (FCSRs) are being explored for their usage as building blocks in stream ciphers. Linearisation attacks are most effective attacks on a class of FCSR-based stream ciphers, which use filtered Galois FCSRs as building blocks. This paper presents techniques for software simulation of these attacks on such ciphers. In order to describe these techniques, the paper uses a small scale variant of the F-FCSR-H v2 type keystream generators, which is known as T-cipher. The paper uses the pseudorandom keystream generator of the T-cipher to develop a statistical analysis. The paper uses this analysis to demonstrate various aspects of the implementation of linearisation attacks on such ciphers. Moreover the paper presents a pseudocode algorithm along with its implementation details for computing the success characteristics of linearisation attacks. The paper also presents enumeration and pseudocode algorithms for solving systems of polynomial equations in the finite field F2.