Cryptography Reference
In-Depth Information
by the keystream generation function. According to [7], the exact bias δ 0 of
M
( c t 0 ,...,c t 0 +25 ) can be calculated. From this, the total bias δ of the sum of
w such terms, which is
·
w
( c t 0 + p i ,...,c t 0 + p i +25 ) ,
M
·
(13)
i =1
was deduced in [7] to be δ = δ 0 by the Piling-up lemma. Therefore, by Eq.(12),
[7] concluded that E0 keystream output has a bias of δ 0 , which was then used
to mount the best known attacks on one-level E0 [7].
3.1 Our Analysis
Note that the above application of the Piling-up lemma to deduce δ = δ 0
is
based on the assumption that with i =1 , 2 , 3 , 4,
x t 0 + p 1 +1 ,...,x t 0 + p 1 +24 ,
x t 0 + p 2 +1 ,...,x t 0 + p 2 +24 ,
.
x t 0 + p w +1 ,...,x t 0 + p w +24 ,
together with the FSM states at t = t 0 + p 1 +1 ,t 0 + p 2 +1 ,...,t 0 + p w +1 all are
independent. Furthermore, it was formally proved in [7] that for w = 1 this is
true assuming the initial states are random and uniformly distributed. In fact,
we can check the following equality always holds:
w
w
w
x t 0 + p j +1 ,
x t 0 + p j +2 ,...,
x t 0 + p j +24 = 0 ,
(14)
j =1
j =1
j =1
for i =1 , 2 , 3 , 4, where 0 denotes the all zero vector. This implies that the above
independence assumption is wrong and the Piling-up lemma is not appropriate
to use to deduce the bias δ of (13). On the other hand, in order to apply Corollary
1 in Section 2 and calculate the real bias δ of (13), we can use (14) to deduce
the relevant distribution D as follows.
We let D represents the distribution of the 4
24 + 4 = 100 bit vector, in
which, the least significant 4 bits consists of the XOR of the FSM state at
t = t 0 + p i +1 with i =1 ,...,w , and the most significant 96 bits consists of the
XOR of x t 0 + p i +1 ,..., x t 0 + p i +24 , x t 0 + p i +1 ,..., x t 0 + p i +24 , x t 0 + p i +1 ,..., x t 0 + p i +24 ,
x t 0 + p i +1 ,..., x t 0 + p i +24 at i =1 ,...,w respectively. Assuming that the FSM
states at t = t 0 + p 1 +1 ,t 0 + p 2 +1 ,...,t 0 + p w + 1 are random and uniformly
distributed, from (14) we deduce that D (0) = D (1) = D (2) =
1
16 .
It is easy to know the Walsh coecients of D : D ( x ) = 1 for all x whose least
significant 4 bits are zeros (denoted by LSB 4 ( x ) = 0) and
···
= D (15) =
D ( x )=0otherwise.
Define f : GF (2) 100
GF (2), which maps the FSM state at t = t 0 +1 and 4
 
Search WWH ::




Custom Search