The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
Dans cet article, nous présentons l'attaque de compromis temps-mémoire-données (TMD) sur les générateurs de fonctions de filtre de chiffrements de flux et les cominateurs de filtres basés sur les fonctions Maiorana-McFarland. Cela peut être considéré comme une généralisation de l'attaque de compromis temps-mémoire-données de Mihaljevic et Imai sur Toyocrypt. Tout d’abord, nous remplaçons la fonction de filtre de Toyocrypt (qui a la même taille que le LFSR) par une fonction générale Maiorana-McFarland. Cela nous permet d’appliquer l’attaque à une classe plus large de chiffrements de flux. Deuxièmement, nous soulignons comment le choix des différentes fonctions Maiorana-McFarland peut affecter l’efficacité de notre attaque. Troisièmement, nous montrons que l’attaque peut être modifiée pour s’appliquer sur des fonctions de filtre plus petites que le LFSR et sur des chiffrements de flux de filtre-combineur. Cela nous permet de cryptanalyser d’autres configurations couramment rencontrées dans la pratique. Enfin, des fonctions de filtrage avec sortie vectorielle sont parfois utilisées dans les chiffrements par flux pour améliorer le débit. Par conséquent, le cas où les fonctions Maiorana-McFarland ont une sortie vectorielle est étudié. Nous avons constaté que la vitesse supplémentaire se fait au prix de faiblesses supplémentaires qui rendent les attaques plus faciles.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Khoongming KHOO, Guanhan CHEW, Guang GONG, Hian-Kiat LEE, "Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions" in IEICE TRANSACTIONS on Fundamentals,
vol. E92-A, no. 1, pp. 11-21, January 2009, doi: 10.1587/transfun.E92.A.11.
Abstract: In this paper, we present the time-memory-data (TMD) trade-off attack on stream ciphers filter function generators and filter cominers based on Maiorana-McFarland functions. This can be considered as a generalization of the time-memory-data trade-off attack of Mihaljevic and Imai on Toyocrypt. First, we substitute the filter function in Toyocrypt (which has the same size as the LFSR) with a general Maiorana-McFarland function. This allows us to apply the attack to a wider class of stream ciphers. Second, we highlight how the choice of different Maiorana-McFarland functions can affect the effectiveness of our attack. Third, we show that the attack can be modified to apply on filter functions which are smaller than the LFSR and on filter-combiner stream ciphers. This allows us to cryptanalyze other configurations commonly found in practice. Finally, filter functions with vector output are sometimes used in stream ciphers to improve the throughput. Therefore the case when the Maiorana-McFarland functions have vector output is investigated. We found that the extra speed comes at the price of additional weaknesses which make the attacks easier.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E92.A.11/_p
Copier
@ARTICLE{e92-a_1_11,
author={Khoongming KHOO, Guanhan CHEW, Guang GONG, Hian-Kiat LEE, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions},
year={2009},
volume={E92-A},
number={1},
pages={11-21},
abstract={In this paper, we present the time-memory-data (TMD) trade-off attack on stream ciphers filter function generators and filter cominers based on Maiorana-McFarland functions. This can be considered as a generalization of the time-memory-data trade-off attack of Mihaljevic and Imai on Toyocrypt. First, we substitute the filter function in Toyocrypt (which has the same size as the LFSR) with a general Maiorana-McFarland function. This allows us to apply the attack to a wider class of stream ciphers. Second, we highlight how the choice of different Maiorana-McFarland functions can affect the effectiveness of our attack. Third, we show that the attack can be modified to apply on filter functions which are smaller than the LFSR and on filter-combiner stream ciphers. This allows us to cryptanalyze other configurations commonly found in practice. Finally, filter functions with vector output are sometimes used in stream ciphers to improve the throughput. Therefore the case when the Maiorana-McFarland functions have vector output is investigated. We found that the extra speed comes at the price of additional weaknesses which make the attacks easier.},
keywords={},
doi={10.1587/transfun.E92.A.11},
ISSN={1745-1337},
month={January},}
Copier
TY - JOUR
TI - Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 11
EP - 21
AU - Khoongming KHOO
AU - Guanhan CHEW
AU - Guang GONG
AU - Hian-Kiat LEE
PY - 2009
DO - 10.1587/transfun.E92.A.11
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E92-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2009
AB - In this paper, we present the time-memory-data (TMD) trade-off attack on stream ciphers filter function generators and filter cominers based on Maiorana-McFarland functions. This can be considered as a generalization of the time-memory-data trade-off attack of Mihaljevic and Imai on Toyocrypt. First, we substitute the filter function in Toyocrypt (which has the same size as the LFSR) with a general Maiorana-McFarland function. This allows us to apply the attack to a wider class of stream ciphers. Second, we highlight how the choice of different Maiorana-McFarland functions can affect the effectiveness of our attack. Third, we show that the attack can be modified to apply on filter functions which are smaller than the LFSR and on filter-combiner stream ciphers. This allows us to cryptanalyze other configurations commonly found in practice. Finally, filter functions with vector output are sometimes used in stream ciphers to improve the throughput. Therefore the case when the Maiorana-McFarland functions have vector output is investigated. We found that the extra speed comes at the price of additional weaknesses which make the attacks easier.
ER -