2004
DOI: 10.1007/978-3-540-25937-4_5
|View full text |Cite
|
Sign up to set email alerts
|

Improving Fast Algebraic Attacks

Abstract: Abstract. An algebraic attack is a method for cryptanalysis which is based on finding and solving a system of nonlinear equations. Recently, algebraic attacks where found helpful in cryptanalysing LFSR-based stream ciphers. The efficiency of these attacks greatly depends on the degree of the nonlinear equations. At Crypto 2003, Courtois [8] proposed Fast Algebraic Attacks. His main idea is to decrease the degree of the equations using a precomputation algorithm. Unfortunately, the correctness of the precomput… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
93
0

Year Published

2005
2005
2013
2013

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 127 publications
(93 citation statements)
references
References 20 publications
(20 reference statements)
0
93
0
Order By: Relevance
“…Then, an additional precomputation step consists in determining the linear combinations of the previous relations which cancel out the highest degree monomials. Some algorithms for this step have been proposed in [7,2]. This technique helps to decrease the degree of the relations used in the attack for different practical examples.…”
Section: Resistance To Fast Algebraic Attacksmentioning
confidence: 99%
“…Then, an additional precomputation step consists in determining the linear combinations of the previous relations which cancel out the highest degree monomials. Some algorithms for this step have been proposed in [7,2]. This technique helps to decrease the degree of the relations used in the attack for different practical examples.…”
Section: Resistance To Fast Algebraic Attacksmentioning
confidence: 99%
“…how about the linear dependency of these linear equations? Fortunately, from the initial state (a 0 , a 2 …”
Section: The Guess-and-determine Algorithmmentioning
confidence: 99%
“…) T corresponding to the bits selected in (a 1 , a 3 , · · · , a 2l−1 ) according to the pattern of (a 0 , a 2 , · · · , a 2(l−1) ) can be regarded as random vectors over GF (2) L . Thus, this holds also for the truncated versions of g i over GF (2) L−l which form the coefficient matrix on the remaining L − l unknown bits.…”
Section: The Guess-and-determine Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…The collection can be used by the designers to create new stream ciphers whose security can be tested using the developed cryptographic attacks. The most effective tests for stream cipher include the correlation and fast correlation attacks [22,13,25,7] and the algebraic and fast algebraic attacks [6,8,1,16].…”
Section: Introductionmentioning
confidence: 99%