An improvement of collision probability in biased birthday attack against A5/1 stream cipher

H. Kourkchi, Hamidreza Tavakoli, M. Naderi
{"title":"An improvement of collision probability in biased birthday attack against A5/1 stream cipher","authors":"H. Kourkchi, Hamidreza Tavakoli, M. Naderi","doi":"10.1109/EW.2010.5483496","DOIUrl":null,"url":null,"abstract":"A5/1 is the strong version of the encryption algorithm on GSM (Global System for Mobile communications) used in many countries. It is constructed of a combination of three LFSRs (Linear Feedback Shift Registers) with irregular clocking manner. One of the most practical attacks against this algorithm is time-memory trade-off attack, which is based on birthday paradox. The goal of this attack is to find any intersection between precomputed LFSRs states set and set of states generating the output bits in the actual execution of the algorithm. In order to increase feasibility of this attack, the biased birthday attack was introduced. In this attack special states producing a specific pattern in output bits are sampled and only a fraction of the special states with higher probability of occurrence are stored. By using a 16-bit pattern of data there are 248 parallelizable preparation stages. This attack requires about 150 GB of memory and two minutes of conversation. Under these conditions, the probability of collision is about 0.61. In this paper an improvement in the collision probability is introduced without changing the available memory capacity and duration of conversation. Our approach is based on using multiple data patterns instead of using a single one. This approach leads to increment of the preprocessing and the collision probability. It is shown that there is a trade-off between the collision probability and the preprocessing complexity.","PeriodicalId":232165,"journal":{"name":"2010 European Wireless Conference (EW)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 European Wireless Conference (EW)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EW.2010.5483496","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

A5/1 is the strong version of the encryption algorithm on GSM (Global System for Mobile communications) used in many countries. It is constructed of a combination of three LFSRs (Linear Feedback Shift Registers) with irregular clocking manner. One of the most practical attacks against this algorithm is time-memory trade-off attack, which is based on birthday paradox. The goal of this attack is to find any intersection between precomputed LFSRs states set and set of states generating the output bits in the actual execution of the algorithm. In order to increase feasibility of this attack, the biased birthday attack was introduced. In this attack special states producing a specific pattern in output bits are sampled and only a fraction of the special states with higher probability of occurrence are stored. By using a 16-bit pattern of data there are 248 parallelizable preparation stages. This attack requires about 150 GB of memory and two minutes of conversation. Under these conditions, the probability of collision is about 0.61. In this paper an improvement in the collision probability is introduced without changing the available memory capacity and duration of conversation. Our approach is based on using multiple data patterns instead of using a single one. This approach leads to increment of the preprocessing and the collision probability. It is shown that there is a trade-off between the collision probability and the preprocessing complexity.
针对A5/1流密码的偏差生日攻击中碰撞概率的改进
A5/1是许多国家使用的GSM(全球移动通信系统)加密算法的强版本。它由三个不规则时钟方式的线性反馈移位寄存器(lfsr)组成。针对该算法最实用的攻击之一是基于生日悖论的时间-记忆权衡攻击。这种攻击的目标是找到预先计算的lfsr状态集和在实际执行算法时生成输出位的状态集之间的任何交集。为了提高这种攻击的可行性,引入了偏差生日攻击。在这种攻击中,对输出位中产生特定模式的特殊状态进行采样,只存储发生概率较高的特殊状态的一小部分。通过使用16位数据模式,有248个可并行的准备阶段。这种攻击需要大约150gb的内存和两分钟的对话。在此条件下,碰撞概率约为0.61。在不改变会话可用内存容量和会话持续时间的情况下,提出了一种改进碰撞概率的方法。我们的方法基于使用多个数据模式,而不是使用单个数据模式。这种方法增加了预处理量和碰撞概率。结果表明,碰撞概率与预处理复杂度之间存在一种权衡关系。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信