On the existence of secure feedback registers

5Citations
Citations of this article
36Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

esigners of stream ciphers have generally used ad hoc meth- ods to build systems that are secure against known attacks. There is often a sense that this is the best that can be done, that any system will even- tually fall to a practical attack. In this paper we show that there are families of keystream generators that resist all possible attacks of a very general type in which a small number of known bits of a keystream are used to synthesize a generator of the keystream (called a synthesizing algorithm). Such attacks are exemplified by the Berlekamp-Massey at- tack. We first formalize the notions of a family of feedback registers and of a synthesizing algorithm. We then show that for any function h(n) that is in O(2n/d) for every d > 0, there is a secure family B of periodic sequences in the sense that any efficient synthesizing algorithm outputs a register of size h(log(period(B))) given the required number of bits of a sequence B ∈ B of large enough period. This result is tight in the sense it fails for any faster growing function h(n). We also consider several variations on this scenario.

Cite

CITATION STYLE

APA

Klapper, A. (1996). On the existence of secure feedback registers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1070, pp. 256–267). Springer Verlag. https://doi.org/10.1007/3-540-68339-9_23

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free