A Time-Memory Trade-off Attack to Bit Search Generator and Its Variants

In 2004, A. Gouget and H. Sibert proposed a new keystream generator called the bit search generator (BSG), to provide high resistance against algebraic attacks. BSG has a very simple algorithm and attractive properties. However it has been cryptanalyzed in different studies by using the fact that ou...

Full description

Saved in:
Bibliographic Details
Published in:2006 IEEE 14th Signal Processing and Communications Applications pp. 1 - 4
Main Authors: Altug, Y., Ayerden, N.P., Erguler, I., Anarim, E.
Format: Conference Proceeding
Language:English
Published: IEEE 2006
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:In 2004, A. Gouget and H. Sibert proposed a new keystream generator called the bit search generator (BSG), to provide high resistance against algebraic attacks. BSG has a very simple algorithm and attractive properties. However it has been cryptanalyzed in different studies by using the fact that output of BSG can be uniquely expressed by differential of the input sequence. Recently, Gouget et al. introduced two modified versions of BSG, named as MBSG and ABSG, to increase its security and also presented their security analysis in the same paper. The best attack that they give against ABSG and MBSG has complexity O(2 L/2 ) and requires O(L2 L/2 ) bits of keystream. In this study, we have shown that BSG, MBSG and ABSG can be cryptanalyzed with a time complexity O(2 L/3 ) by using a time-memory trade-off attack. The method requires 2 2L/3 words of memory and O(2L+2 L/3 ) bits of keystream. According to computer simulation results, we have found out that MBSG is the most vulnerable generator among BSG and variants to proposed attack. Moreover, ABSG doesn't bring any additional security to original BSG for proposed time-memory trade-off attack
ISBN:1424402387
9781424402380
ISSN:2165-0608
2693-3616
DOI:10.1109/SIU.2006.1659878