Abstract
In this paper we investigate univariate algebraic attacks on filter generators over extension fields \(\mathbb {F}_q=\mathbb {F}_{2^n}\) with focus on the Welch–Gong (WG) family of stream ciphers. Our main contribution is to reduce the general algebraic attack complexity on such cipher by proving new and lower bounds for the spectral immunity of such ciphers. The spectral immunity is the univariate analog of algebraic immunity and instead of measuring degree of multiples of a multivariate polynomial, it measures the minimum number of nonzero coefficients of a multiple of a univariate polynomial. In particular, there is an algebraic degeneracy in these constructions, which, when combined with attacks based on low-weight multiples over \(\mathbb {F}_q\), provides much more efficient attacks than over \(\mathbb {F}_2\). With negligible computational complexity, our best attack breaks the primitive WG-5 if given access to 4 kilobytes of keystream, break WG-7 if given access to 16 kilobytes of keystream and break WG-8 if given access to half a megabyte of keystream. Our best attack on WG-16 targeted at 4G-LTE is less practical, and requires \(2^{103}\) computational complexity and \(2^{61}\) bits of keystream. In all instances, we significantly lower both keystream and computational complexity in comparison to previous estimates. On a side note, we resolve an open problem regarding the rank of a type of equation systems used in algebraic attacks.
Similar content being viewed by others
References
Aagaard M.D., Gong G., Mota, R.K.: Hardware implementations of the WG-5 cipher for passive RFID tags, In: IEEE International Symposium on Hardware-Oriented Security and Trust (HOST), 2013 pp. 29–34 (June 2013).
Armknecht F.: Improving fast algebraic attacks. In: Proceedings of Fast Software Encryption 2004. Lecture Notes in Computer Science, vol. 3017, pp. 65–82, Springer, Berlin (2004).
Armknecht F., Ars G.: Introducing a new variant of fast algebraic attacks and minimizing their successive data complexity. In: Dawson E., Vaudenay S. (eds.) Mycrypt 2005 (International Conference on Cryptology in Malaysia). Lecture Notes in Computer Science, vol. 3715, pp. 16–32 (2005).
Armknecht F., Krause M.: Algebraic attacks on combiners with memory. In: Advances in Cryptology-CRYPTO 2003. Lecture Notes in Computer Science, vol. 2729, pp. 162–176. Springer, Berlin (2003).
Brynielsson L.: On the linear complexity of combined shift register sequences. In: William H.C (ed.) EUROCRYPT85, pp. 156–160. Springer, Berlin (1985).
Canteaut A.: Open problems related to algebraic attacks on stream ciphers. In: Coding and Cryptography, Lecture Notes in Computer Science, vol. 3969, pp. 120–134, Springer, Berlin (2006).
Courtois N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology-Crypto’2003. Lecture Notes in Computer Science, vol. 2729, pp. 176–194, Springer, Berlin (2003).
Courtois N., Meier W.: Algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology—-Eurocrypt’2003. Lecture Notes in Computer Science, vol. 2656, pp. 345–359. Springer, Berlin (2003).
Ding L., Jin C.: Cryptanalysis of lightweight WG-8 stream cipher. IEEE Trans. Inf. Forensics Secur. 9(4), 645–652 (2014).
ETSI/SAGE. Specification of the 3GPP Confidentiality and Integrity Algorithms UEA & UIA2 Document 2: Snow 3G Specification (version 1.1) (September 2006), http://www.3gpp.org/ftp
Fan X., Gong G.: Specification of the stream cipher WG-16 based confidentiality and integrity algorithms, Technical Report CACR 2013-06 at University of Waterloo, http://cacr.uwaterloo.ca/techreports/2013/cacr2013-06.pdf.
Fan X., Mandal K., Gong G.: WG-8: A lightweight Stream cipher for resource-constrained smart devices, In: Singh K., Awasthi AK (eds.) Quality, Reliability, Security and Robustness in Heterogeneous Networks. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer, Berlin.
Golomb S.W.: Shift Register Sequences. Holden-Day Inc, San Francisco (1967) (Revised edn, Aegean Park Press, Laguna Hills 1982).
Golomb S.W., Gong G.: Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar. Cambridge University Press, New York (2004).
Gong G., Rønjom S., Helleseth T., Hu H.: Fast discrete Fourier spectra attacks on stream ciphers. IEEE Trans. Inf. Theory, 57(8), 5555–5565 (2011).
Helleseth T., Rønjom S.: Simplifying algebraic attacks with univariate analysis. Information Theory and Applications Workshop (ITA) 2011, 1–7 (2011).
Lidl R., Niederreiter H.: Finite Fields In Encyclopedia of Mathematics and Its Applications, Cambridge University Press, Cambridge (1997).
Luo Y., Chai Q., Gong G., Lai X.: A Lightweight Stream Cipher, WG-7 for RFID Encryption and Authentication, In: IEEE Global Telecommunications Conference (GLOBECOM), Dec 2010, pp. 1–6 (2010).
Meier W., Pasalic E., Carlet C.: Algebraic attacks and decomposition of Boolean functions. In: Cachin C., Camenisch J (eds.) Advances in Cryptology - EUROCRYPT 2004. Lecture Notes in Computer Science, vol. 3027, pp. 474–491.Springer, Berlin (2004).
Nawaz Y., Gong G.: The WG Stream Cipher. EU ECRYPT eSTREAM competition, http://www.ecrypt.eu.org/stream/.
Orumiehchiha M.A., Pieprzyk J., Steinfeld R.: Cryptanalysis of WG-7: a lightweight stream cipher. In: Cryptography and Communications, vol. 4, pp. 3–4, Springer, Berlin (2012).
Philip H., Rose G.G. In: Advances in Cryptology—CRYPTO 2004: Proceedings of 24th Annual International Cryptology Conference, Santa Barbara, California, USA, Aug 15–19, 2004. Lecture Notes in Computer Science. Rewriting variables: The complexity of fast algebraic attacks on stream ciphers. Springer, Berlin (2004).
Rønjom S., Helleseth T.: A New attack on the filter generator. IEEE Trans. Inf. Theory 53(5), 17520–17558 (2007).
Rønjom S., Helleseth T.: Attacking the filter generator over \(GF(2^m)\), Arithmetic of Finite Fields, First International Workshop, WAIFA 2007, Madrid, Spain, June 2007. Lecture Notes in Computer Science, vol. 4547, pp. 264–275 (2007).
Shparlinski I.E. : On the singularity of generalised Vandermonde matrices over finite fields. In: Finite Fields and Applications, vol. 11, no. 2, pp. 193–199. Elsevier Science Publishers B. V., North-Holland, (2005).
Author information
Authors and Affiliations
Corresponding author
Additional information
This is one of several papers published in Designs, Codes and Cryptography comprising the “Special Issue on Coding and Cryptography”.
Rights and permissions
About this article
Cite this article
Rønjom, S. Improving algebraic attacks on stream ciphers based on linear feedback shift register over \(\mathbb {F}_{2^k}\) . Des. Codes Cryptogr. 82, 27–41 (2017). https://doi.org/10.1007/s10623-016-0212-9
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10623-016-0212-9