Paper 2006/049

Crossword Puzzle Attack on NLS

Joo Yeon Cho and Josef Pieprzyk

Abstract

NLS is one of the stream ciphers submitted to the eSTREAM project. We present a distinguishing attack on NLS by Crossword Puzzle (CP) attack method which is newly introduced in this paper. We build the distinguisher by using linear approximations of both the non-linear feedback shift register (NFSR) and the nonlinear filter function (NLF). Since the bias of the distinguisher depends on the $Konst$ value, which is a key-dependent word, we present the graph showing how the bias of distinguisher vary with $Konst$. In result, we estimate the average bias to be around $O(2^{-30})$. Therefore, we claim that NLS is distinguishable from truly random cipher after observing $O(2^{60})$ keystream words on the average. The experiments also show that our distinguishing attack is successful on $90.3\%$ of $Konst$ among $2^{32}$ possible values.

Note: This is an extended version of the paper which was presented in SASC 2006.

Metadata
Available format(s)
PS
Publication info
Published elsewhere. Unknown where it was published
Keywords
Distinguishing AttacksStream CiphersLinear ApproximationseSTREAMNLSCrossword Puzzle Attack
Contact author(s)
jcho @ ics mq edu au
History
2006-03-08: revised
2006-02-14: received
See all versions
Short URL
https://ia.cr/2006/049
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2006/049,
      author = {Joo Yeon Cho and Josef Pieprzyk},
      title = {Crossword Puzzle Attack on {NLS}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2006/049},
      year = {2006},
      url = {https://eprint.iacr.org/2006/049}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.