Abstract
Correlation-immunity is a cryptographic criterion on Boolean functions arising from correlation attacks on combining functions. When it comes to filtering functions, the status of correlation-immunity lacks study in itself and, if it is commonly accepted as a requirement for nonlinear filter generators, this is for other concerns. We revisit the concept of correlation-immunity and clear up its meaning for filtering functions. We summarize existing criteria similar to correlation-immunity and attacks in two different models, showing that such criteria are not relevant in both models. We also derive a precise property to avoid correlations due to the filter function only, which appears to be a bit looser than correlation-immunity. We then propose new attacks based on whether this property is verified.
Chapter PDF
Similar content being viewed by others
References
Anderson, R.J.: Searching for the Optimum Correlation Attack. In: Preneel, B. (ed.) Fast Software Encryption. LNCS, vol. 1008, pp. 137–143. Springer, Heidelberg (1995)
Biryukov, A., Shamir, A.: Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)
Canteaut, A., Filiol, E.: On the influence of the filtering function on the performance of fast correlation attacks on filter generators. In: Proceedings of 23rd Symposium on Information Theory in the Benelux, Louvain-la-Neuve, Belgique, pp. 299–306 (2002)
Canteaut, A., Trabbia, M.: Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 573–588. Springer, Heidelberg (2000)
Chepyzhov, V., Johansson, T., Smeets, B.J.M.: A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 181–195. Springer, Heidelberg (2001)
Dichtl, M.: On Nonlinear Filter Generators. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 103–106. Springer, Heidelberg (1997)
Ding, C., Xiao, G., Shan, W.: The Stability Theory of Stream Ciphers, vol. 561. Springer, Berlin (1991)
Dj.Golic, J.: On the Security of Nonlinear Filter Generators. In: Gollmann, D. (ed.) Proceedings of Fast Software Encryption 1996. LNCS, vol. 1039, pp. 173–188. Springer, Heidelberg (1996)
Hong, J., Sarkar, P.: New Applications of Time Memory Data Tradeoffs. In: Roy, B. (ed.) ASIACRYPT 2005. LNCS, vol. 3788, pp. 353–372. Springer, Heidelberg (2005)
Logachev, O.A.: On Perfectly Balanced Boolean Functions. Cryptology ePrint Archive, Report 2007/022 (2007), http://eprint.iacr.org/
Meier, W., Staffelbach, O.: Fast Correlation Attacks on Certain Stream Ciphers. Journal of Cryptology 1(3), 159–176 (1989)
Meier, W., Staffelbach, O.: Nonlinearity Criteria for Cryptographic Functions. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 549–562. Springer, Heidelberg (1990)
Menezes, A.J., Vanstone, S.A., Van Oorschot, P.C.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton, FL, USA (1996)
Rueppel, R.A.: Analysis and design of stream ciphers. Springer, New York (1986)
Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory 30(5), 776–780 (1984)
Siegenthaler, T.: Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol. 219, pp. 103–110. Springer, Heidelberg (1986)
Siegenthaler, T.: Decrypting a Class of Stream Ciphers Using Ciphertext Only. IEEE Trans. Computers 34(1), 81–85 (1985)
Sumarokov, S.N.: Zaprety dvoichnyx funkcii i obratimost’ dlya odnogo klassa kodiruyushchix ustrojstv (Defects of Boolean functions and invertibility of a class of coding circuits, in Russian). Obozrenie prikladnoj i promyshlennoj matematiki 1(1), 33–55 (1994)
Wu, H., Preneel, B.: Cryptanalysis of the Stream Cipher DECIM. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 30–40. Springer, Heidelberg (2006)
Xiao, G., Massey, J.L.: A spectral characterization of correlation immune combining functions. IEEE Transactions on Information Theory IT-34(3), 569–571 (1988)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Gouget, A., Sibert, H. (2007). Revisiting Correlation-Immunity in Filter Generators. In: Adams, C., Miri, A., Wiener, M. (eds) Selected Areas in Cryptography. SAC 2007. Lecture Notes in Computer Science, vol 4876. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77360-3_24
Download citation
DOI: https://doi.org/10.1007/978-3-540-77360-3_24
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-77359-7
Online ISBN: 978-3-540-77360-3
eBook Packages: Computer ScienceComputer Science (R0)