J4 ›› 2012, Vol. 39 ›› Issue (4): 114-119.doi: 10.3969/j.issn.1001-2400.2012.04.021

• Original Articles • Previous Articles     Next Articles

Distinguishing attacks on generalized self-shrinking generators

LI Xuelian1;GAO Juntao2,3;HU Yupu1;ZHANG Fengrong1   

  1. (1. School of Science, Xidian Univ., Xi'an  710071, China;
    2. Key Lab. of Computer Networks and Information Security of Ministry of Education, Xidian Univ., Xi'an  710071, China;
    3. State Key Lab. of Info. Security, Inst. of Software, Chinese Academy of Sci., Beijing  100190, China)
  • Received:2011-05-04 Online:2012-08-20 Published:2012-10-08
  • Contact: LI Xuelian E-mail:xlli@mail.xidian.edu.cn

Abstract:

With simple construction and easy implementation, the generalized self-shrinking generator is a keystream generator intended to be used as a stream cipher. This paper investigates the security of the generalized self-shrinking generator. We propose two distinguishing attacks on the generalized self-shrinking sequences by using the feedback polynomial and the sequence v. The results show that the attacker can launch a distinguishing attack by choosing the hw-1 keystream bit of the generalized self-shrinking generator, if the feedback polynomial f(x) is of hamming weight w and degree h. On the other hand, if the hamming weight of f(x) is low, then the attacker can launch a distinguishing attack, and the attack complexity depends on the weight of f(x).  Therefore, neither type of the polynomials can be chosen as the feedback polynomials of the generalized self-shrinking generator. Users should choose the feedback polynomial carefully, otherwise the stream cipher can suffer from distinguishing attacks.

Key words: cryptography, generalized self-shrinking generators, distinguishing attacks, linear feedback shift registers, polynomials

CLC Number: 

  • T N918. 1

Baidu
map