Correlation attacks on stream ciphers using convolutional codes

Show simple item record

dc.contributor.advisor Penzhorn, W.T. en
dc.contributor.postgraduate Bruwer, Christian S en
dc.date.accessioned 2013-09-06T18:15:30Z
dc.date.available 2006-01-24 en
dc.date.available 2013-09-06T18:15:30Z
dc.date.created 2005-06-14 en
dc.date.issued 2007-01-24 en
dc.date.submitted 2006-01-24 en
dc.description Dissertation (MEng (Electronic Engineering))--University of Pretoria, 2007. en
dc.description.abstract This dissertation investigates four methods for attacking stream ciphers that are based on nonlinear combining generators: -- Two exhaustive-search correlation attacks, based on the binary derivative and the Lempel-Ziv complexity measure. -- A fast-correlation attack utilizing the Viterbi algorithm -- A decimation attack, that can be combined with any of the above three attacks. These are ciphertext-only attacks that exploit the correlation that occurs between the ciphertext and an internal linear feedback shift-register (LFSR) of a stream cipher. This leads to a so-called divide and conquer attack that is able to reconstruct the secret initial states of all the internal LFSRs within the stream cipher. The binary derivative attack and the Lempel-Ziv attack apply an exhaustive search to find the secret key that is used to initialize the LFSRs. The binary derivative and the Lempel-Ziv complexity measures are used to discriminate between correct and incorrect solutions, in order to identify the secret key. Both attacks are ideal for implementation on parallel processors. Experimental results show that the Lempel-Ziv correlation attack gives successful results for correlation levels of p = 0.482, requiring approximately 62000 ciphertext bits. And the binary derivative attack is successful for correlation levels of p = 0.47, using approximately 24500 ciphertext bits. The fast-correlation attack, utilizing the Viterbi algorithm, applies principles from convolutional coding theory, to identify an embedded low-rate convolutional code in the pn-sequence that is generated by an internal LFSR. The embedded convolutional code can then be decoded with a low complexity Viterbi algorithm. The algorithm operates in two phases: In the first phase a set of suitable parity check equations is found, based on the feedback taps of the LFSR, which has to be done once only once for a targeted system. In the second phase these parity check equations are utilized in a Viterbi decoding algorithm to recover the transmitted pn-sequence, thereby obtaining the secret initial state of the LFSR. Simulation results for a 19-bit LFSR show that this attack can recover the secret key for correlation levels of p = 0.485, requiring an average of only 153,448 ciphertext bits. All three attacks investigated in this dissertation are capable of attacking LFSRs with a length of approximately 40 bits. However, these attacks can be extended to attack much longer LFSRs by making use of a decimation attack. The decimation attack is able to reduce (decimate) the size of a targeted LFSR, and can be combined with any of the three above correlation attacks, to attack LFSRs with a length much longer than 40 bits. en
dc.description.availability unrestricted en
dc.description.department Electrical, Electronic and Computer Engineering en
dc.identifier.citation Bruwer, C 2005, Correlation attacks on stream ciphers using convolutional codes, MEng dissertation, University of Pretoria, Pretoria, viewed yymmdd < http://hdl.handle.net/2263/24740 > en
dc.identifier.upetdurl http://upetd.up.ac.za/thesis/available/etd-01242006-090544/ en
dc.identifier.uri http://hdl.handle.net/2263/24740
dc.language.iso en
dc.publisher University of Pretoria en_ZA
dc.rights © 2005, University of Pretoria. All rights reserved. The copyright in this work vests in the University of Pretoria. No part of this work may be reproduced or transmitted in any form or by any means, without the prior written permission of the University of Pretoria. en
dc.subject Linear feedback shift register en
dc.subject Viterbi algorithm en
dc.subject Cryptanalysis en
dc.subject Stream cipher non-linear combining function en
dc.subject Correlation attack en
dc.subject Lempel-ziv complexity en
dc.subject Binary discriminator en
dc.subject Binary derivative en
dc.subject UCTD en_US
dc.title Correlation attacks on stream ciphers using convolutional codes en
dc.type Dissertation en


Files in this item

This item appears in the following Collection(s)

Show simple item record