This paper presents a new class of cryptanalytic attacks, which are applicable against those binary additive synchronous stream ciphers, whose analysis theory is based on the properties of 2-adic numbers. These attacks are named as 'Linearisation Attacks'. Linearisation attacks consist of three variants, which are referred as 'Conventional Linearisation Attacks (CLAs)', 'Fast Linearisation Attacks (FLAs)' and 'Improved Linearisation Attacks (ILAs)'. The paper demonstrates, these new attacks against F-FCSR-H and an eSTREAM candidate F-FCSR-H v2 stream ciphers by presenting state recovery algorithms based on CLAs, FLAs and ILAs. The paper analyses the efficiency of these attacks in terms of data, time and memory complexities. The paper also presents a comparative analysis of these attacks, which shows that these variants provide a tradeoff of various complexity measures, i.e. data, time and memory complexities when compared with each other. Further more, the paper also presents a key recovery algorithm, which works in conjunction with the state recovery algorithms to recover the effective key used in these ciphers.. These sub-filters are publicly known as part of the algorithm and are given below (in hex form).
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.