Abstract
Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first described attacks on ciphers using such a resync mechanism. In this paper, we extend their attacks in several ways by combining the standard attack with cryptanalytic techniques such as algebraic attacks and linear cryptanalysis. Our results show that using linear resync mechanisms should be avoided, and provide lower bounds for the nonlinearity required from a secure resync mechanism.
This work was supported by the Concerted Research Action (GOA) Mefisto-2000/04 of the Flemish Government.
Chapter PDF
Similar content being viewed by others
References
Anderson, R.: A5 (Was: Hacking Digital Phones). Sci. Crypt post (June 1994)
Armknecht, F., Lano, J., Preneel, B.: Extending the Resynchronization Attack (extended version). Cryptology ePrint Archive, Report 2004/232 (2004)
Armknecht, F., Krause, M.: Algebraic attacks on combiners with memory. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 162–175. Springer, Heidelberg (2003)
Armknecht, F.: Improving fast algebraic attacks. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 65–82. Springer, Heidelberg (2004)
Armknecht, F.: On the Existence of Low-degree Equations for Algebraic Attacks, Cryptology ePrint Archive, Report 2004/185 (2004)
Bluetooth, S.I.G.: Specification of the Bluetooth System, Version 1.2(2003), available from www.bluetooth.org/spec
Borissov, Y., Nikova, S., Preneel, B., Vandewalle, J.: On a resynchronization weakness in a class of combiners with memory. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 164–173. Springer, Heidelberg (2003)
Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) Eurocrypt 2003. LNCS, vol. 2656, pp. 345–359. Springer-Verlag, Heidelberg (2003)
Courtois, N.T.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 176–194. Springer, Heidelberg (2003)
Daemen, J., Govaerts, R., Vandewalle, J.: Resynchronization weaknesses in synchronous stream ciphers. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 159–167. Springer, Heidelberg (1994)
Fluhrer, S.: Improved key recovery of level 1 of the Bluetooth Encryption System, Cryptology ePrint Archive, Report 2002/068 (2002)
Fontaine, C.: Contribution à la Recherche de Fonctions Booléennes Hautement Non Linéaires, et au Marquage d’Images en Vue de la Protection des Droits d’Auteur, PhD Thesis, Paris University (1998)
Golić, J.D.: Correlation via linear sequential circuit approximation of combiners with memory. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 113–123. Springer, Heidelberg (1993)
Golic, J.: Linear Cryptanalysis of Stream Ciphers. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, pp. 154–169. Springer-Verlag, Heidelberg (1994)
Golić, J.D., Morgari, G.: On the resynchronization attack. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 100–110. Springer, Heidelberg (2003)
Joux, A., Muller, F.: A Chosen IV Attack against Turing. In: Matsui, M., Zuccherato, R. (eds.) SAC 2003. LNCS, vol. 3006, pp. 194–207. Springer-Verlag, Heidelberg (2003)
Lee, D.-H., Kim, J.H., Hong, J., Han, J.W., Moon, D.: Algebraic attacks on summation generators. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 34–48. Springer, Heidelberg (2004)
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)
Meier, W., Pasalic, E., Carlet, C.: Algebraic attacks and decomposition of boolean functions. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 474–491. Springer, Heidelberg (2004)
Meier, W., Staffelbach, O.: Correlation properties of combiners with memory in stream ciphers. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 204–213. Springer, Heidelberg (1991)
Mihaljević, M., Imai, H.: Cryptanalysis of Toyocrypt-HS1 stream cipher. IEICE Transactions on Fundamentals 85, 66–73 (2002), Available at, http://www.csl.sony.co.jp/ATL/papers/IEICEjan02.pdf.
New European Schemes for Signature, Integrity and Encryption, http://www.cryptonessie.org
Rueppel, R.A.: Correlation immunity and the summation generator. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 260–272. Springer, Heidelberg (1986)
Rueppel, R.: Analysis and Design of Stream Ciphers. Springer-Verlag, Heidelberg (1986)
Saarinen, M.: Bluetooth und E0. Sci. Crypt post (February 2002)
Sarkar, P., Maitra, S.: Nonlinearity bounds and constructions of resilient boolean functions. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 515–532. Springer, Heidelberg (2000)
Strassen, V.: Gaussian Elimination is Not Optimal. Numerische Mathematik 13, 354–356 (1969)
Tarannikov, Y.V.: On resilient boolean functions with maximal possible nonlinearity. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 19–30. Springer, Heidelberg (2000)
Xiao, G., Massey, J.: A Spectral Characterization of Correlation-immune Combining Functions. IEEE Trans. Inf. Theory IT-34, 569–571 (1988)
Zeng, K., Yang, C.H., Rao, T.R.N.: On the linear consistency test (LCT) in cryptanalysis with applications. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 164–174. Springer, Heidelberg (1990)
Zheng, Y., Zhang, X.-M.: Plateaued functions. In: Varadharajan, V., Mu, Y. (eds.) ICICS 1999. LNCS, vol. 1726, pp. 284–300. Springer, Heidelberg (1999)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Armknecht, F., Lano, J., Preneel, B. (2004). Extending the Resynchronization Attack. In: Handschuh, H., Hasan, M.A. (eds) Selected Areas in Cryptography. SAC 2004. Lecture Notes in Computer Science, vol 3357. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30564-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-540-30564-4_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24327-4
Online ISBN: 978-3-540-30564-4
eBook Packages: Computer ScienceComputer Science (R0)