图书馆订阅: Guest
Begell Digital Portal Begell 数字图书馆 电子图书 期刊 参考文献及会议录 研究收集
电信和无线电工程
SJR: 0.203 SNIP: 0.44 CiteScore™: 1

ISSN 打印: 0040-2508
ISSN 在线: 1943-6009

卷:
卷 79, 2020 卷 78, 2019 卷 77, 2018 卷 76, 2017 卷 75, 2016 卷 74, 2015 卷 73, 2014 卷 72, 2013 卷 71, 2012 卷 70, 2011 卷 69, 2010 卷 68, 2009 卷 67, 2008 卷 66, 2007 卷 65, 2006 卷 64, 2005 卷 63, 2005 卷 62, 2004 卷 61, 2004 卷 60, 2003 卷 59, 2003 卷 58, 2002 卷 57, 2002 卷 56, 2001 卷 55, 2001 卷 54, 2000 卷 53, 1999 卷 52, 1998 卷 51, 1997

电信和无线电工程

DOI: 10.1615/TelecomRadEng.v78.i7.50
pages 607-614

STUDYING OF k-DIMENSIONALITY OF THE LILI-128 CIPHER BOOLEAN FUNCTION

S. M. Konushok
Institute of Special Communication and Information Security of Igor Sikorsky National Technical University of Ukraine "Kyiv Polytechnic Institute", 4 Verkhnokliuchova St., Kyiv 03056, Ukraine

ABSTRACT

The paper presents results of the experimental study of the k-dimensionality of the LILI-128 cipher Boolean function, which demonstrated the potential for the execution of a statistical attack based on near-proximity of the Boolean functions with algebraically degenerate functions.

REFERENCES

  1. Dinur, I. and Shamir, A., (2009) , Cube attacks on tweakable black box polynomials, Advances in Cryptology. – EUROCRYPT’09, Proceedings, Springer-Verlag, pp. 278-299.

  2. Fischer, S., Khazaei, S., and Meier, W., (2008) , Chosen IV statistical analysis for key recovery attacks on stream ciphers, AFRICACRYPT 2008, Proceedings, Springer-Verlag, pp. 236-245.

  3. Aumasson, J.-Ph., Dinur, I., Hensen, L., Meier, W. et al., (2009) , Efficient FPGA implementations of high-dimensional cube testers on the stream cipher Grain-128, Cryptology ePrint Archive, URL: http://eprint.iacr.org/2009/218 (last access: 29.10.18).

  4. Aumasson, J.-Ph., Dinur, I., Meier, W., and Shamir, A., (2009) , Cube testers and key recovery attacks on reduced-round MD6 and Trivium, Fast Software Encryption – FSE’09, Proceedings, Springer- Verlag, pp. 1-22.

  5. Aumasson, J.-Ph., Fischer, S., Khazaei, S., Meier, W. et al., (2008) , New features of Latin dances: analysis of Salsa, Cha-cha, and Rumba, Fast Software Encryption – FSE’08, Proceedings, Springer- Verlag, pp. 470-488.

  6. Dinur, I., Gueysu, T., Paar, C., Shamir, A. et al., (2011) , An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware, Cryptology ePrint Archive, URL: http://eprint.iacr.org/2011/282 (last access: 29.10.18).

  7. Dinur, I. and Shamir, A., (2011) , Breaking Grain-128 with dynamic cube attacks, Fast Software Encryption – FSE’11, Proceedings, Springer-Verlag, pp. 167-187.

  8. Faisal, Sh., Resa, M., Susilo, W., and Seberry, J., (2011) , Extended cubes: enhancing cube attacks by low-degree non-linear equations, Proc. of the 6-th ACM Symp. on Information, Comput. and Communication Security (AIACCS’11), pp. 296-305.

  9. Alekseychuk, А.N., Konushok, S.N., and Storozhuk, А.Yu., (2015) , Generalized statistical attack against synchronous stream ciphers, Information Security, 17(3), pp. 54-65, (in Ukrainian).

  10. Alekseychuk, А.N., Konushok, S.N., and Storozhuk, А.Yu., (2014) , Statistical attack on gamma generator with linear law re-initialization of the initial state and complicating function close to the algebraically degenerate one, Radiotekhnika, 176, pp. 13-21, (in Russian).

  11. Alekseychuk, А.N. and Konushok, S.N., (2014) , Algebraically degenerate approximations of Boolean functions, Cybernetics and System Analysis, 50(6), pp. 3-14, (in Russian).

  12. Oleksiychuk, А.М., Konushok, S.М., and Storozhuk, А.Yu., (2015) , Fast algorithms for constructing k-dimensional approximations for Boolean functions, Information Security, 17(1), pp. 43-52, (in Ukrainian).

  13. Alekseychuk, А.N. and Konushok, S.N., (2013) , An improved k-dimensionality test for Boolean functions, Cybernetics and System Analysis, 49(2), pp. 27-35, (in Russian).

  14. Lechner, R.L., (1971) , Harmonic analysis of switching functions, Recent Developments in Switching Theory, New-York. Academic Press, pp. 122-228.

  15. Dawson, E. and Wu, C.K., (1997) , Construction of correlation immune Boolean functions, Information and Communication Security, Proceedings. Berlin, Springer-Verlag, pp. 170-180.

  16. Alekseev, Е.K., (2011) , On some measures of nonlinearity for Boolean functions, Applied Discrete Mathematics, 2(12), pp. 5-16, (in Russian).

  17. Gopalan, P., O’Donnell, R., Servedio, A., Shpilka, A. et al., (2011) , Testing Fourier dimensionality and sparsity, SIAM J. on Computing, 40(4), pp. 1075-1100.

  18. Golic, J. and Morgari, G., (2003) , On the resynchronization attack, Fast Software Encryption. – FSE’03, Proceedings, Springer-Verlag, pp. 100-110.

  19. Alekseev, Е.К., (2010) , On attack against filtering generator with the complication function close to the algebraically degenerate one, Proc. of the Sixth Intern. Sci. Conf. on the Problems of Security and Combating Terrorism, Moscow, Russia, pp. 114-122.

  20. Logachev, О.А., Salnikov, А.А., and Yashchenko, V.V., (2004) , Boolean Functions in Coding Theory and Cryptology, Moscow, Russia: MCCМE, 470 p., (in Russian).

  21. Simpson, L.R., Dawson, E., Golić, J.D., and Millan, W.L., (2000) , LILI Keystream Generator, Selected Areas in Cryptography, – SAC 2000, Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 2012, pp. 248-261.

  22. NESSIE New European Schemes for Signatures, Integrity, and Encryption, URL: https://www.cosic.esat.kuleuven.be/nessie/ (last access: 29.10.18).


Articles with similar content:

The Method of Main Coordinate in the Theory of Parametric Synthesis of the Linear Stabilized Systems
Journal of Automation and Information Sciences, Vol.49, 2017, issue 3
Tatyana Ye. Aleksandrova , Yevgeniy Ye. Aleksandrov
The Method of Choice and Analysis of Learning Lots for Classification of Remote Probing Data
Journal of Automation and Information Sciences, Vol.39, 2007, issue 4
Larisa V. Areshkina
THE SOLUTION TO THE PROBLEM OF DEFLECTIONS OF A RECTANGULAR THIN ISOTROPIC PLATE WITH ALL BUILT-IN EDGES IN THE EQUATIONS FOR THE BENDING MOMENTS
TsAGI Science Journal, Vol.48, 2017, issue 7
Julian Fedotovich Yaremchuk
Mathematical Models of Rotatory Motion of Spacecrafts with Superfluous Systems of Gyrodins and Flywheels and Control Problems of Their Attitude. Part II
Journal of Automation and Information Sciences, Vol.35, 2003, issue 6
Vasiliy I. Popadinets, Igor A. Kutsenko, Victor V. Volosov
Intelligence System of Clinical Diagnostics Control
Journal of Automation and Information Sciences, Vol.39, 2007, issue 6
Igor N. Dolgopolov