Algebraic Attacks on Stream Ciphers with Linear Feedback

@inproceedings{Courtois2003AlgebraicAO,
  title={Algebraic Attacks on Stream Ciphers with Linear Feedback},
  author={Nicolas Courtois and Willi Meier},
  booktitle={EUROCRYPT},
  year={2003}
}
Many popular stream ciphers apply a filter/combiner to the state of one or several LFSRs. Algebraic attacks on such ciphers [10, 11] are possible, if there is a multivariate relation involving the key/state bits and the output bits. Recent papers by Courtois, Meier, Krause and Armknecht [1, 2, 10, 11] show that such relations exist for several well known constructions of stream ciphers immune to all previously known attacks. In particular, they allow to break two ciphers using LFSRs and… CONTINUE READING
Highly Influential
This paper has highly influenced 85 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 1,110 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 494 extracted citations

Algebraic Attacks on Combiners with Memory and Several Outputs

IACR Cryptology ePrint Archive • 2003
View 13 Excerpts
Highly Influenced

Evaluation of Algebraic Immunity of modern block ciphers

2018 IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT) • 2018
View 6 Excerpts
Highly Influenced

1-Resilient Boolean Functions on Even Variables with Almost Perfect Algebraic Immunity

Gang Han, Yu Yu, +3 authors Hui Li
Security and Communication Networks • 2017
View 7 Excerpts
Highly Influenced

1,111 Citations

050100'01'04'08'12'16
Citations per Year
Semantic Scholar estimates that this publication has 1,111 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 28 references

Algebraic Attacks on Stream Ciphers with Linear Feedback

Nicolas Courtois, Willi Meier
Warsaw, Poland, • 2003
View 11 Excerpts
Highly Influenced

Higher Order Correlation Attacks, XL algorithm and Cryptanalysis of Toyocrypt

IACR Cryptology ePrint Archive • 2002
View 12 Excerpts
Highly Influenced

Algebraic Attacks on Combiners with Memory

View 11 Excerpts
Highly Influenced

Cryptanalysis of LILI-128

View 4 Excerpts
Highly Influenced

The Security of Hidden Field Equations (HFE)

CT-RSA • 2001
View 6 Excerpts
Highly Influenced

Golic: On the Security of Nonlinear Filter Generators, FSE’96

Jovan Dj
LNCS 1039, • 1996
View 5 Excerpts
Highly Influenced

A Linearization Attack on the Bluetooth Key Stream Generator

IACR Cryptology ePrint Archive • 2002
View 10 Excerpts
Highly Influenced

Efficient Algorithms for solving Overdefined Systems of Multivariate Polynomial Equations, Eurocrypt’2000

Adi Shamir, Jacques Patarin, Nicolas Courtois, Alexander Klimov
LNCS 1807, • 2000
View 4 Excerpts
Highly Influenced

Communication theory of secrecy systems

Claude Elwood Shannon
Bell System Technical Journal • 2002