2016
DOI: 10.1007/978-3-662-52993-5_5
|View full text |Cite
|
Sign up to set email alerts
|

Attacks Against Filter Generators Exploiting Monomial Mappings

Abstract: Filter generators are vulnerable to several attacks which have led to well-known design criteria on the Boolean filtering function. However, Rønjom and Cid have observed that a change of the primitive root defining the LFSR leads to several equivalent generators. They usually offer different security levels since they involve filtering functions of the form F (x k) where k is coprime to (2 n − 1) and n denotes the LFSR length. It is proved here that this monomial equivalence does not affect the resistance of t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 35 publications
(75 reference statements)
0
1
0
Order By: Relevance
“…They redefine the nonlinearity of the LFSR filter function as the minimal distance between equivalent filter functions and affine functions, which implies that a correlation attack may be more successful on a weak equivalent generator. This observation has been proved by Canteaut and Rotella at FSE 2016 [24]. In their paper, they describe how to mount a fast correlation attack on equivalent LFSR filters.…”
Section: Overall Security Analysismentioning
confidence: 82%
“…They redefine the nonlinearity of the LFSR filter function as the minimal distance between equivalent filter functions and affine functions, which implies that a correlation attack may be more successful on a weak equivalent generator. This observation has been proved by Canteaut and Rotella at FSE 2016 [24]. In their paper, they describe how to mount a fast correlation attack on equivalent LFSR filters.…”
Section: Overall Security Analysismentioning
confidence: 82%