Loading...

An improvement of collision probability in biased birthday attack against A5/1 stream cipher

Kourkchi, H ; Sharif University of Technology | 2010

678 Viewed
  1. Type of Document: Article
  2. DOI: 10.1109/EW.2010.5483496
  3. Publisher: 2010
  4. Abstract:
  5. A5/1 is the strong version of the encryption algorithm on GSM (Global System for Mobile communications) used in many countries. It is constructed of a combination of three LFSRs (Linear Feedback Shift Registers) with irregular clocking manner. One of the most practical attacks against this algorithm is time-memory trade-off attack, which is based on birthday paradox. The goal of this attack is to find any intersection between precomputed LFSRs states set and set of states generating the output bits in the actual execution of the algorithm. In order to increase feasibility of this attack, the biased birthday attack was introduced. In this attack special states producing a specific pattern in output bits are sampled and only a fraction of the special states with higher probability of occurrence are stored. By using a 16-bit pattern of data there are 248 parallelizable preparation stages. This attack requires about 150 GB of memory and two minutes of conversation. Under these conditions, the probability of collision is about 0.61. In this paper an improvement in the collision probability is introduced without changing the available memory capacity and duration of conversation. Our approach is based on using multiple data patterns instead of using a single one. This approach leads to increment of the preprocessing and the collision probability. It is shown that there is a trade-off between the collision probability and the preprocessing complexity
  6. Keywords:
  7. A5/1 ; Birthday paradox ; Stream cipher ; Bit patterns ; Collision probability ; Encryption algorithms ; Irregular clocking ; Linear feedback shift registers ; Memory capacity ; Multiple data ; Output bits ; Probability of occurrence ; Stream Ciphers ; Time-Memory Tradeoff attacks ; Algorithms ; Cellular telephone systems ; Cryptography ; Global system for mobile communications ; Hydraulics ; Probability ; Shift registers ; Transport properties ; Waveguide couplers ; Computer crime
  8. Source: 2010 European Wireless Conference, EW 2010, 12 April 2010 through 15 April 2010, Lucca ; April , 2010 , Pages 444-448 ; 9781424459995 (ISBN)
  9. URL: http://ieeexplore.ieee.org/document/5483496/?section=abstract