Abstract
Feedback polynomials with low degree multiples of low weight should be avoided in linear feedback shift registers when used in nonlinear combiners. We consider another class of weak feedback polynomials, namely the class when taps are located in small groups. This class was introduced in 2004 demonstrating that the resulting distinguishing attack can sometimes be better than the one using low weight multiples. In this paper we take another look at these polynomials and give further insight to the theory behind the attack complexity. Using the Walsh transform we show an easy way to determine the attack complexity given a polynomial. Further, we show that the size of the vectors should sometimes be larger than previously known. We also give a simple relation showing when the new attack will outperform the simple attack based on low weight multiples.
Original language | English |
---|---|
Pages | 1115-1119 |
Number of pages | 5 |
Publication status | Published - 2009 |
Event | IEEE International Symposium on Information Theory (ISIT), 2009 - Seoul, Korea, Seoul, Korea, Democratic People's Republic of Duration: 2009 Jun 28 → 2009 Jul 3 |
Conference
Conference | IEEE International Symposium on Information Theory (ISIT), 2009 |
---|---|
Country/Territory | Korea, Democratic People's Republic of |
City | Seoul |
Period | 2009/06/28 → 2009/07/03 |
Subject classification (UKÄ)
- Electrical Engineering, Electronic Engineering, Information Engineering
Free keywords
- weak feedback polynomials
- stream ciphers
- cryptography
- LFSR