Abstract
In this paper, the algebraic immunity of S-boxes and augmented functions of stream ciphers is investigated. Augmented functions are shown to have some algebraic properties that are not covered by previous measures of immunity. As a result, efficient algebraic attacks with very low data complexity on certain filter generators become possible. In a similar line, the algebraic immunity of the augmented function of the eSTREAM candidate Trivium is experimentally tested. These tests suggest that Trivium has some immunity against algebraic attacks on augmented functions.
Chapter PDF
References
Anderson, R.J.: Searching for the Optimum Correlation Attack. In: Preneel, B. (ed.) FSE 1994. LNCS, vol. 1008, Springer, Heidelberg (1995)
Armknecht, F., Krause, M.: Constructing Single- and Multi-Output Boolean Functions with Maximal Algebraic Immunity. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol. 4052, Springer, Heidelberg (2006)
Armknecht, F., Carlet, C., Gaborit, P., Künzli, S., Meier, W., Ruatta, O.: Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, Springer, Heidelberg (2006)
Babbage, S.: A Space/Time Tradeoff in Exhaustive Search Attacks on Stream Ciphers. In: European Convention on Security and Detection. IEE Conference Publication No. 408 (1995)
Biryukov, A., Shamir, A.: Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, Springer, Heidelberg (2000)
de Cannière, C., Preneel, B.: Trivium - A Stream Cipher Construction Inspired by Block Cipher Design Principles. In: eSTREAM, ECRYPT Stream Cipher Project, Report 2005/030
Canteaut, A.: Open Problems Related to Algebraic Attacks on Stream Ciphers. In: Ytrehus, Ø. (ed.) WCC 2005. LNCS, vol. 3969, Springer, Heidelberg (2006)
Courtois, N.: Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt. In: Cryptology ePrint Archive, Report 2002/087
Courtois, N.: Algebraic Attacks on Combiners with Memory and Several Outputs. In: Cryptology ePrint Archive, Report 2003/125
Courtois, N.: How Fast can be Algebraic Attacks on Block Ciphers. In: Cryptology ePrint Archive, Report 2006/168
Courtois, N., Debraize, B., Garrido, E.: On Exact Algebraic (Non-)Immunity of S-boxes Based on Power Functions. In: Cryptology ePrint Archive, Report 2005/203
Courtois, N., Meier, W.: Algebraic Attacks on Stream Ciphers with Linear Feedback. In: Biham, E. (ed.) Advances in Cryptology – EUROCRPYT 2003. LNCS, vol. 2656, Springer, Heidelberg (2003)
Courtois, N., Pieprzyk, J.: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, Springer, Heidelberg (2002)
Courtois, N., Shamir, A., Patarin, J., Klimov, A.: Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, Springer, Heidelberg (2000)
Faugère, J.-C., Ars, G.: An Algebraic Cryptanalysis of Nonlinear Filter Generators using Gröbner Bases. In: Rapport de Recherche de l’INRIA (2003)
Golić, J.Dj.: On the Security of Nonlinear Filter Generators. In: Gollmann, D. (ed.) Fast Software Encryption. LNCS, vol. 1039, Springer, Heidelberg (1996)
Hong, J.: Some Trivial States of Trivium. In: eSTREAM Discussion Forum (2005)
Krause, M.: BDD-Based Cryptanalysis of Keystream Generators. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, Springer, Heidelberg (2002)
Löhlein, B.: Attacks based on Conditional Correlations against the Nonlinear Filter Generator. In: Cryptology ePrint Archive, Report 2003/020
Nawaz, Y., Gupta, K.C., Gong, G.: Algebraic Immunity of S-boxes Based on Power Mappings: Analysis and Construction. In: Cryptology ePrint Archive, Report 2006/322
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Fischer, S., Meier, W. (2007). Algebraic Immunity of S-Boxes and Augmented Functions. In: Biryukov, A. (eds) Fast Software Encryption. FSE 2007. Lecture Notes in Computer Science, vol 4593. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-74619-5_23
Download citation
DOI: https://doi.org/10.1007/978-3-540-74619-5_23
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-74617-1
Online ISBN: 978-3-540-74619-5
eBook Packages: Computer ScienceComputer Science (R0)