Abstract
This paper describes new methods for fast correlation attacks on stream ciphers, based on techniques used for constructing and decoding the by now famous turbo codes. The proposed algorithm consists of two parts, a preprocessing part and a decoding part. The preprocessing part identifies several parallel convolutional codes, embedded in the code generated by the LFSR, all sharing the same information bits. The decoding part then finds the correct information bits through an iterative decoding procedure. This provides the initial state of the LFSR.
Chapter PDF
Similar content being viewed by others
References
L. R. Bahl, J. Cooke, F. Jelinek, and J. Raviv, “Optimal decoding of linear codes for minimizing symbol error rate,” IEEE Trans. Inform. Theory, vol. IT-20, 1974, pp. 284–287.
C. Berrou, A. Glavieux, and P. Thitimajshima, “Near Shannon limit errorcorrecting coding and decoding,” Proc., IEEE Int. Conf. on Communications, ICC’93, 1993, pp. 1064–1070.
V. Chepyzhov, and B. Smeets, “On a fast correlation attack on certain stream ciphers”, In Advances in Cryptology—EUROCRYPT’91, Lecture Notes in Computer Science, vol. 547, Springer-Verlag, 1991, pp. 176–185.
A. Clark, J. Golic, E. Dawson, “A comparison of fast correlation attacks”, Fast Software Encryption, FSE’96, Lecture Notes in Computer Science, Springer-Verlag, vol. 1039, 1996, pp. 145–158.
J. Hagenauer, E. Offer, and L. Papke, “Iterative decoding of binary block and convolutional codes,” IEEE Trans. Inform. Theory, vol. IT-42, 1996, pp. 429–445.
R. G. Gallager, Low-Density Parity-Check Codes, MIT Press, Cambridge, MA, 1963.
R. Johanesson, K. Sh. Zigangirov, Fundamentals of convolutional coding, IEEE Press, New York, 1999.
T. Johansson, F. Jönsson, “Improved fast correlation attacks on stream ciphers via convolutional codes”, Advances in Cryptology—EUROCRYPT’99, Lecture Notes in Computer Science, vol. 1592, Springer-Verlag, 1999, pp. 347–362.
J. Leon, “A probabilistic algorithm for computing minimum weights of large errorcorrecting codes”, IEEE Trans. Information Theory, vol. 34, 1988, pp. 1354–1359.
F. MacWilliams, N. Sloane, The theory of error correcting codes, North Holland, 1977.
W. Meier, and O. Staffelbach, “Fast correlation attacks on stream ciphers”, Advances in Cryptology—EUROCRYPT’88, Lecture Notes in Computer Science, vol. 330, Springer-Verlag, 1988, pp. 301–314.
W. Meier, and O. Staffelbach, “Fast correlation attacks on certain stream ciphers”, Journal of Cryptology, vol. 1, 1989, pp. 159–176.
A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
M. Mihaljevic, and J. Golic, “A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence”, Advances in Cryptology—AUSCRYPT’90, Lectures Notes in Computer Science, vol. 453, Springer-Verlag, 1990, pp. 165–175.
W. Penzhorn, “Correlation attacks on stream ciphers: Computing low weight parity checks based on error correcting codes”, Fast Software Encryption, FSE’96, Lecture Notes in Computer Science, vol. 1039, Springer-Verlag, 1996, pp. 159–172.
T. Siegenthaler, “Correlation-immunity of nonlinear combining functions for cryptographic applications”, IEEE Trans. on Information Theory, vol. IT-30, 1984, pp. 776–780.
T. Siegenthaler, “Decrypting a class of stream ciphers using ciphertext only”, IEEE Trans. on Computers, vol. C-34, 1985, pp. 81–85.
J. Stern, “A method for finding codewords of small weight,” Coding Theory and Applications, Springer-Verlag, 1989, pp. 106–113.
A. Trofimov, K. Zigangirov, “A posteriori probability decoding of convolutional codes”, to appear in Problems of Information Transmission, 1999.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Johansson, T., Jönsson, F. (1999). Fast Correlation Attacks Based on Turbo Code Techniques. In: Wiener, M. (eds) Advances in Cryptology — CRYPTO’ 99. CRYPTO 1999. Lecture Notes in Computer Science, vol 1666. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48405-1_12
Download citation
DOI: https://doi.org/10.1007/3-540-48405-1_12
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-66347-8
Online ISBN: 978-3-540-48405-9
eBook Packages: Springer Book Archive