81 research outputs found

    Some Results on Distinguishing Attacks on Stream Ciphers

    Get PDF
    Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is sent over a digital communication channel. In this thesis we will present new cryptanalytic results for several stream ciphers. The thesis provides a general introduction to cryptology, explains the basic concepts, gives an overview of various cryptographic primitives and discusses a number of different attack models. The first new attack given is a linear correlation attack in the form of a distinguishing attack. In this attack a specific class of weak feedback polynomials for LFSRs is identified. If the feedback polynomial is of a particular form the attack will be efficient. Two new distinguishing attacks are given on classical stream cipher constructions, namely the filter generator and the irregularly clocked filter generator. It is also demonstrated how these attacks can be applied to modern constructions. A key recovery attack is described for LILI-128 and a distinguishing attack for LILI-II is given. The European network of excellence, called eSTREAM, is an effort to find new efficient and secure stream ciphers. We analyze a number of the eSTREAM candidates. Firstly, distinguishing attacks are described for the candidate Dragon and a family of candidates called Pomaranch. Secondly, we describe resynchronization attacks on eSTREAM candidates. A general square root resynchronization attack which can be used to recover parts of a message is given. The attack is demonstrated on the candidates LEX and Pomaranch. A chosen IV distinguishing attack is then presented which can be used to evaluate the initialization procedure of stream ciphers. The technique is demonstrated on four candidates: Grain, Trivium, Decim and LEX

    Phase-shift Fault Analysis of Grain v1

    Get PDF
    This paper deals with the phase-shift fault analysisof stream cipher Grain v1. We assume that the attacker is ableto desynchronize the linear and nonlinear registers of the cipherduring the keystream generation phase by either forcing one ofthe registers to clock one more time, while the other register is notclocked, or by preventing one of the registers from clocking, whilethe other register is clocked. Using this technique, we are able toobtain the full inner state of the cipher in reasonable time (under12 hours on a single PC) by using 150 bits of unfaulted keystream,600 bits of faulted keystreams and by correctly guessing 28 bitsof the linear register

    Investigations in the design and analysis of key-stream generators

    Get PDF
    iv+113hlm.;24c

    On the Design and Analysis of Stream Ciphers

    Get PDF
    This thesis presents new cryptanalysis results for several different stream cipher constructions. In addition, it also presents two new stream ciphers, both based on the same design principle. The first attack is a general attack targeting a nonlinear combiner. A new class of weak feedback polynomials for linear feedback shift registers is identified. By taking samples corresponding to the linear recurrence relation, it is shown that if the feedback polynomial has taps close together an adversary to take advantage of this by considering the samples in a vector form. Next, the self-shrinking generator and the bit-search generator are analyzed. Both designs are based on irregular decimation. For the self-shrinking generator, it is shown how to recover the internal state knowing only a few keystream bits. The complexity of the attack is similar to the previously best known but uses a negligible amount of memory. An attack requiring a large keystream segment is also presented. It is shown to be asymptotically better than all previously known attacks. For the bit-search generator, an algorithm that recovers the internal state is given as well as a distinguishing attack that can be very efficient if the feedback polynomial is not carefully chosen. Following this, two recently proposed stream cipher designs, Pomaranch and Achterbahn, are analyzed. Both stream ciphers are designed with small hardware complexity in mind. For Pomaranch Version 2, based on an improvement of previous analysis of the design idea, a key recovery attack is given. Also, for all three versions of Pomaranch, a distinguishing attack is given. For Achterbahn, it is shown how to recover the key of the latest version, known as Achterbahn-128/80. The last part of the thesis introduces two new stream cipher designs, namely Grain and Grain-128. The ciphers are designed to be very small in hardware. They also have the distinguishing feature of allowing users to increase the speed of the ciphers by adding extra hardware

    D2.1 - Report on Selected TRNG and PUF Principles

    Get PDF
    This report represents the final version of Deliverable 2.1 of the HECTOR work package WP2. It is a result of discussions and work on Task 2.1 of all HECTOR partners involved in WP2. The aim of the Deliverable 2.1 is to select principles of random number generators (RNGs) and physical unclonable functions (PUFs) that fulfill strict technology, design and security criteria. For example, the selected RNGs must be suitable for implementation in logic devices according to the German AIS20/31 standard. Correspondingly, the selected PUFs must be suitable for applying similar security approach. A standard PUF evaluation approach does not exist, yet, but it should be proposed in the framework of the project. Selected RNGs and PUFs should be then thoroughly evaluated from the point of view of security and the most suitable principles should be implemented in logic devices, such as Field Programmable Logic Arrays (FPGAs) and Application Specific Integrated Circuits (ASICs) during the next phases of the project

    Journal of Telecommunications and Information Technology, 2003, nr 4

    Get PDF
    kwartalni

    Recent Advances in Signal Processing

    Get PDF
    The signal processing task is a very critical issue in the majority of new technological inventions and challenges in a variety of applications in both science and engineering fields. Classical signal processing techniques have largely worked with mathematical models that are linear, local, stationary, and Gaussian. They have always favored closed-form tractability over real-world accuracy. These constraints were imposed by the lack of powerful computing tools. During the last few decades, signal processing theories, developments, and applications have matured rapidly and now include tools from many areas of mathematics, computer science, physics, and engineering. This book is targeted primarily toward both students and researchers who want to be exposed to a wide variety of signal processing techniques and algorithms. It includes 27 chapters that can be categorized into five different areas depending on the application at hand. These five categories are ordered to address image processing, speech processing, communication systems, time-series analysis, and educational packages respectively. The book has the advantage of providing a collection of applications that are completely independent and self-contained; thus, the interested reader can choose any chapter and skip to another without losing continuity

    Wide-Angle Multistatic Synthetic Aperture Radar: Focused Image Formation and Aliasing Artifact Mitigation

    Get PDF
    Traditional monostatic Synthetic Aperture Radar (SAR) platforms force the user to choose between two image types: larger, low resolution images or smaller, high resolution images. Switching to a Wide-Angle Multistatic Synthetic Aperture Radar (WAM-SAR) approach allows formation of large high-resolution images. Unfortunately, WAM-SAR suffers from two significant implementation problems. First, wavefront curvature effects, non-linear flight paths, and warped ground planes lead to image defocusing with traditional SAR processing methods. A new 3-D monostatic/bistatic image formation routine solves the defocusing problem, correcting for all relevant wide-angle effects. Inverse SAR (ISAR) imagery from a Radar Cross Section (RCS) chamber validates this approach. The second implementation problem stems from the large Doppler spread in the wide-angle scene, leading to severe aliasing problems. This research effort develops a new anti-aliasing technique using randomized Stepped-Frequency (SF) waveforms to form Doppler filter nulls coinciding with aliasing artifact locations. Both simulation and laboratory results demonstrate effective performance, eliminating more than 99% of the aliased energy

    The rise, consolidation and disintegration of Dlamini power in Swaziland between 1820 and 1889 : a study in the relationship of foreign affairs to internal political development

    Get PDF
    The Swazi kingdom grew out of the pressures associated with competition for trade and for the rich resources of Shiselweni. While centred on this area it acquired some of its characteristic features - notably a regimental system, and the dominance of a Dlamini aristocracy. Around 1815 the Swazi came under pressure from the South, and were forced to colonise the land lying north of the Lusutfu. Here they remained for some years a nation under arms, as they plundered local peoples, and were themselves swept about by the currents of the Mfecane. In time a more settled administration emerged, as the aristocracy spread out from the royal centres at Ezulwini, and this process accelerated under Mswati as he subdued recalcitrant chiefdoms, and restructured the regiments. Consequently, by the time Mswati died in 1865, Dlamini power was sufficiently entrenched for there to be no serious disturbance, and for a regency to function smoothly for the following decade. Externally the dominant influence was the Zulu, who continually threatened the kingdom's stability. The Swazi were forced by these attacks to look for allies in the Boers, and to make several territorial cessions from 1846. Nevertheless, the relations they established were not markedly unequal, since the Republic were dependent on the Swazi in various ways. Consequently, the Swazi were able to take charge of the lowveld in the north, and by the 1860s reached the pinnacle of their power. The consolidation of the South African Republic following the British annexation, and the discovery of gold, meant that this freedom was gradually lost, and in the 1880s pressure mounted on Swaziland itself. The clearest index of this lies in the country's conquest by concessions, which eventually so eroded the social fabric of the country that a pretext was given for the Republic and Britain to intervene

    Disaster in Crisis:Social Reproduction Struggles during the Long American Downturn

    Get PDF
    corecore