Abstract

The Shrinking Generator (SG) is a popular synchronous, lightweight stream cipher that uses minimal computing power. However, its strengths and weaknesses have not been studied in detail. This paper proposes a statistical testing framework to assess attacks on the SG. The framework consists of a d-monomial test that is adapted to SG by applying the algebraic normal form (ANF) representation of Boolean functions, a test that uses the maximal degree monomial test to determine whether the ANF follows the proper mixing of bit values, and a proposed unique window size (UWS) scheme to test the randomness properties of the keystream. The proposed framework shows significant weaknesses in the SG output in terms of dependence between the controlling linear-feedback shift register (LFSR) and non-linearity of the resulting keystream. The maximal degree monomial test provides a better understanding of the optimal points of SG, demonstrating when it is at its best and worst according to the first couple of results. This paper uses UWS to illustrate the effect of the LFSR choice on possibly distinguishing attacks on the SG. The results confirm that the proposed UWS scheme is a viable measure of the cryptographic strength of a stream cipher. Due to the importance of predictability and effective tools, we used neural network models to simulate the input data for the pseudo-random binary sequences. Through the calculation of UWS, we obtained solid results for the predictions.

Highlights

  • Cryptography is used to transform information from plain text to cipher text and vice versa in order to prevent unauthorized access to information [1, 2]

  • The shrinking generator (SG) was first introduced in [7]. It is composed of two shift registers, namely shift register B, linear-feedback shift register (LFSR) and LFSRA

  • LFSRB is designated as a control register that orchestrates what is produced by LFSRA

Read more

Summary

INTRODUCTION

Cryptography is used to transform information from plain text to cipher text and vice versa in order to prevent unauthorized access to information [1, 2]. This paper focuses on symmetric encryption, synchronous stream ciphers, of which the shrinking generator (SG) is an example. LFSRA generates the output bits and LFSRB generates the controlling bits. The bit from LFSRA is output as part of the keystream whenever the bit from LFSRB is 1, otherwise the output is not selected by the cipher. The SG is still studied, and its practical advantages continue to be appreciated. While the study was simplistic in its approach, the SG was useful. The SG continues to attract interest because of its reputation as a standard and a model for enlightening cryptanalysis techniques. Lessons learned from the SG can be transferred to the cryptanalysis of other cipher techniques

BACKGROUND
USING THE D-MONOMIAL TEST
Our Approach to the d-Monomial Test
Our Experiments for the d-Monomial Test
RESULTS
Maximal Degree Monomial Test
Discussion of d-Monomial and Maximal Degree Monomial
TESTING FOR THE UNIQUE WINDOW SIZE
UWS Tests
Statistical Distribution and Prediction Modeling
Implications of the UWS
PROPOSED NEURAL NETWORK PREDICTION MODEL
Neural Networks and Security
Neural Network Model Implementations
NN Models and Results for SG
Comparison with Self-Shrinking Generator
The Difference between SG and SSG
NN Model Design
OUR FINDINGS
CONCLUSIONS
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call