DocumentCode :
3063669
Title :
Algebraic attack on the Alternating Step(r,s) Generator
Author :
Hassanzadeh, M.M. ; Helleseth, Tor
Author_Institution :
Dept. of Inf., Univ. of Bergen, Bergen, Norway
fYear :
2010
fDate :
13-18 June 2010
Firstpage :
2493
Lastpage :
2497
Abstract :
The Alternating Step(r, s) Generator, ASG(r, s), is a clock-controlled sequence generator which is recently proposed by A. Kanso. It consists of three registers of length l, m and n bits. The first register controls the clocking of the two others. The two other registers are clocked r times (or not clocked) (resp. s times or not clocked) depending on the clock-control bit in the first register. The special case r = s = 1 is the original and well known Alternating Step Generator. Kanso claims there is no efficient attack against the ASG(r, s) since r and s are kept secret. In this paper, we present an Alternating Step Generator, ASG, model for the ASG(r, s) and also we present a new and efficient algebraic attack on ASG(r, s) using 3(m + n) bits of the output sequence to find the secret key with O((m2+n2)2l+1+m32m-1+n32n-1) computational complexity. We show that this system is no more secure than the original ASG, in contrast to the claim of the ASG(r, s)´s constructor.
Keywords :
algebra; computational complexity; cryptography; sequences; algebraic attack; alternating step generator; alternating step(r,s) generator; clock-control bit; clock-controlled sequence generator; computational complexity; output sequence; Clocks; Computational complexity; Councils; Informatics; Linear feedback control systems; Linear feedback shift registers; Linearity; Random sequences; Security;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Theory Proceedings (ISIT), 2010 IEEE International Symposium on
Conference_Location :
Austin, TX
Print_ISBN :
978-1-4244-7890-3
Electronic_ISBN :
978-1-4244-7891-0
Type :
conf
DOI :
10.1109/ISIT.2010.5513443
Filename :
5513443
Link To Document :
بازگشت