Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a

Authors

  • Zhaocun Zhou Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing, China; University of Chinese Academy of Sciences, Beijing, China
  • Dengguo Feng State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, Beijing, China
  • Bin Zhang Trusted Computing and Information Assurance Laboratory, Institute of Software, Chinese Academy of Sciences, Beijing, China

DOI:

https://doi.org/10.46586/tosc.v2022.i2.322-350

Keywords:

Linear approximation, Fast correlation attack, Iterative decoding, Grain-128a

Abstract

Fast correlation attack, pioneered by Meier and Staffelbach, is an important cryptanalysis tool for LFSR-based stream cipher, which exploits the correlation between the LFSR state and key stream and targets at recovering the initial state of LFSR via a decoding algorithm. In this paper, we develop a vectorial decoding algorithm for fast correlation attack, which is a natural generalization of the original binary approach. Our approach benefits from the contributions of all correlations in a subspace. We propose two novel criteria to improve the iterative decoding algorithm. We also give some cryptographic properties of the new FCA which allows us to estimate the efficiency and complexity bounds. Furthermore, we apply this technique to the well-analyzed stream cipher Grain-128a. Based on a hypothesis, an interesting result for its security bound is deduced from the perspective of iterative decoding. Our analysis reveals the potential vulnerability for LFSRs over matrix ring and also for nonlinear functions with biased multidimensional linear approximations such as Grain-128a.

Downloads

Published

2022-06-10

How to Cite

Zhou, Z., Feng, D., & Zhang, B. (2022). Vectorial Decoding Algorithm for Fast Correlation Attack and Its Applications to Stream Cipher Grain-128a. IACR Transactions on Symmetric Cryptology, 2022(2), 322–350. https://doi.org/10.46586/tosc.v2022.i2.322-350

Issue

Section

Articles