On the existence of secure keystream generators

被引:4
作者
Klapper, A [1 ]
机构
[1] Univ Kentucky, Dept Comp Sci, Lexington, KY 40506 USA
关键词
binary sequences; keystream generators; security; cryptography; stream ciphers;
D O I
10.1007/s001450010014
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Designers of stream ciphers have generally used ad hoc methods to build systems that are secure against known attacks. There is often a sense that this is the best that can be done, that any system will eventually fall to a practical attack. In this paper we show that there are families of keystream generators that resist all possible attacks of a very general type in which a small number of known bits of a keystream are used to synthesize a generator of the keystream (called a synthesizing algorithm). Such attacks are exemplified by the Berlekamp-Massey attack. We first formalize the notions of a family of finite keystream generators and of a synthesizing algorithm. We then show that for any function h(n) that is in O(2(n/d)) for every d > 0, there is a family a of periodic sequences such that any efficient synthesizing algorithm outputs a generator of size h (log(per(B))) given the required number of bits of a sequence B is an element of B of large enough period. This result is tight in the sense that it fails for any faster growing function h(n). We also consider several variations on this scenario.
引用
收藏
页码:1 / 15
页数:15
相关论文
共 21 条
[1]  
[Anonymous], 1991, LECT NOTES COMPUTER
[2]  
[Anonymous], 1982, 23 ANN S FDN COMPUTE, DOI DOI 10.1109/SFCS.1982.45
[3]  
[Anonymous], LECT NOTES COMPUTER
[4]  
Balcazar J., 1988, STRUCTURAL COMPLEXIT, V1
[5]   HOW TO GENERATE CRYPTOGRAPHICALLY STRONG SEQUENCES OF PSEUDO-RANDOM BITS [J].
BLUM, M ;
MICALI, S .
SIAM JOURNAL ON COMPUTING, 1984, 13 (04) :850-864
[6]   ON THE LINEAR SPAN OF BINARY SEQUENCES OBTAINED FROM Q-ARY M-SEQUENCES, Q ODD [J].
CHAN, AH ;
GAMES, RA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1990, 36 (03) :548-552
[7]  
Cohen G, 1997, COVERING CODES
[8]   COVERING RADIUS - SURVEY AND RECENT RESULTS [J].
COHEN, GD ;
KARPOVSKY, MG ;
MATTSON, HF ;
SCHATZ, JR .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1985, 31 (03) :328-343
[9]   ON THE COVERING RADIUS OF REED-MULLER CODES [J].
COHEN, GD ;
LITSYN, SN .
DISCRETE MATHEMATICS, 1992, 106 :147-155
[10]  
DING C, 1994, LECT NOTES COMPUTER, V809, P101