Attacking of Stream Cipher Systems Using a Genetic Algorithm

Similar documents
New Address Shift Linear Feedback Shift Register Generator

Stream Ciphers. Debdeep Mukhopadhyay

Performance Evaluation of Stream Ciphers on Large Databases

Cryptanalysis of LILI-128

Sequences and Cryptography

DESIGN and IMPLETATION of KEYSTREAM GENERATOR with IMPROVED SECURITY

Stream Cipher. Block cipher as stream cipher LFSR stream cipher RC4 General remarks. Stream cipher

A Pseudorandom Binary Generator Based on Chaotic Linear Feedback Shift Register

Cryptography CS 555. Topic 5: Pseudorandomness and Stream Ciphers. CS555 Spring 2012/Topic 5 1

Randomness analysis of A5/1 Stream Cipher for secure mobile communication

LFSR stream cipher RC4. Stream cipher. Stream Cipher

A Dominant Gene Genetic Algorithm for a Substitution Cipher in Cryptography

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Understanding Cryptography A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl. Chapter 2 Stream Ciphers ver.

Modified Alternating Step Generators with Non-Linear Scrambler

A New Proposed Design of a Stream Cipher Algorithm: Modified Grain - 128

MATHEMATICAL APPROACH FOR RECOVERING ENCRYPTION KEY OF STREAM CIPHER SYSTEM

Optimization of Multi-Channel BCH Error Decoding for Common Cases. Russell Dill Master's Thesis Defense April 20, 2015

Various Artificial Intelligence Techniques For Automated Melody Generation

Soft Computing Approach To Automatic Test Pattern Generation For Sequential Vlsi Circuit

Fault Analysis of Stream Ciphers

Cryptanalysis of the Bluetooth E 0 Cipher using OBDD s

Pseudorandom bit Generators for Secure Broadcasting Systems

Fault Analysis of Stream Ciphers

AWord-Based Genetic Algorithm for Cryptanalysis of Short Cryptograms

USAGE OF FIREFLY ALGORITHM IN VIGNERE CIPHER TO REDUCE VARIABLE LENGTH KEY SEARCH TIME

(12) Patent Application Publication (10) Pub. No.: US 2003/ A1

STA4000 Report Decrypting Classical Cipher Text Using Markov Chain Monte Carlo

WG Stream Cipher based Encryption Algorithm

PA Substitution Cipher

How to Predict the Output of a Hardware Random Number Generator

Music Composition with Interactive Evolutionary Computation

Modified Version of Playfair Cipher Using Linear Feedback Shift Register and Transpose Matrix Concept

Welch Gong (Wg) 128 Bit Stream Cipher For Encryption and Decryption Algorithm

VIDEO intypedia001en LESSON 1: HISTORY OF CRYPTOGRAPHY AND ITS EARLY STAGES IN EUROPE. AUTHOR: Arturo Ribagorda Garnacho

Synthesis Techniques for Pseudo-Random Built-In Self-Test Based on the LFSR

Fault Analysis of GRAIN-128

Institute of Southern Punjab, Multan

V.Sorge/E.Ritter, Handout 5

Design and Implementation of Data Scrambler & Descrambler System Using VHDL

An Improved Hardware Implementation of the Grain-128a Stream Cipher

BeepBeep: Embedded Real-Time Encryption

Power Optimization of Linear Feedback Shift Register Using Clock Gating

Physical Layer Built-in Security Analysis and Enhancement of CDMA Systems

CS408 Cryptography & Internet Security

SECURED EEG DISTRIBUTION IN TELEMEDICINE USING ENCRYPTION MECHANISM

Decim v2. To cite this version: HAL Id: hal

DETERMINISTIC TEST PATTERN GENERATOR DESIGN WITH GENETIC ALGORITHM APPROACH

Algorithmic Music Composition

Fugue generation using genetic algorithms

TERRESTRIAL broadcasting of digital television (DTV)

Design of Fault Coverage Test Pattern Generator Using LFSR

THE USE OF forward error correction (FEC) in optical networks

The Swiss cipher machine NeMa

LFSR Counter Implementation in CMOS VLSI

DesignandImplementationofDataScramblerDescramblerSystemusingVHDL

Evolving Cellular Automata for Music Composition with Trainable Fitness Functions. Man Yat Lo

Implementation of a turbo codes test bed in the Simulink environment

Enigma. Developed and patented (in 1918) by Arthur Scherbius Many variations on basic design Eventually adopted by Germany

Multiple Image Secret Sharing based on Linear System

PART FOUR. Polyalphabetic Substitution Systems PERIODIC POLYALPHABETIC SUBSTITUTION SYSTEMS

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving

THE MAJORITY of the time spent by automatic test

Breaking the Enigma. Dmitri Gabbasov. June 2, 2015

NAVAL POSTGRADUATE SCHOOL Monterey, California

On the Characterization of Distributed Virtual Environment Systems

A High- Speed LFSR Design by the Application of Sample Period Reduction Technique for BCH Encoder

Optimum Composite Field S-Boxes Aimed at AES

Distortion Analysis Of Tamil Language Characters Recognition

EFFICIENT IMPLEMENTATION OF RECENT STREAM CIPHERS ON RECONFIGURABLE HARDWARE DEVICES

ISSN (Print) Original Research Article. Coimbatore, Tamil Nadu, India

Implementation of BIST Test Generation Scheme based on Single and Programmable Twisted Ring Counters

Keywords- Cryptography, Frame, Least Significant Bit, Pseudo Random Equations, Text, Video Image, Video Steganography.

Exercise 4. Data Scrambling and Descrambling EXERCISE OBJECTIVE DISCUSSION OUTLINE DISCUSSION. The purpose of data scrambling and descrambling

Adaptive decoding of convolutional codes

A VLSI Implementation of an Analog Neural Network suited for Genetic Algorithms

Ultra-lightweight 8-bit Multiplicative Inverse Based S-box Using LFSR

VLSI System Testing. BIST Motivation

The A to Z GUIDE to the ZK-Crypt

Testing of Cryptographic Hardware

Optimizing Fuzzy Flip-Flop Based Neural Networks by Bacterial Memetic Algorithm

Physical Layer Built-in Security Enhancement of DS-CDMA Systems Using Secure Block Interleaving

LFSRs as Functional Blocks in Wireless Applications Author: Stephen Lim and Andy Miller

Weighted Random and Transition Density Patterns For Scan-BIST

Most people familiar with codes and cryptography have at least heard of the German

CRYPTOGRAPHY. Sharafat Ibn Mollah Mosharraf TOUCH-N-PASS EXAM CRAM GUIDE SERIES. Special Edition for CSEDU. Students CSE, DU )

Fully Pipelined High Speed SB and MC of AES Based on FPGA

Bit Swapping LFSR and its Application to Fault Detection and Diagnosis Using FPGA

1 Introduction 2. 3 Zygalski Sheets Using Zygalski Sheets Programmatic Replication Weaknesses/Problems 7

Hardware Implementation of Viterbi Decoder for Wireless Applications

DESIGN OF RECONFIGURABLE IMAGE ENCRYPTION PROCESSOR USING 2-D CELLULAR AUTOMATA GENERATOR

Fault Detection And Correction Using MLD For Memory Applications

CSc 466/566. Computer Security. 4 : Cryptography Introduction

Evolutionary Computation Applied to Melody Generation

Automated Accompaniment

HCCA: A Cryptogram Analysis Algorithm Based on Hill Climbing

Power Problems in VLSI Circuit Testing

Evaluation of Fibonacci Test Pattern Generator for Cost Effective IC Testing

Individual Project Report

ECE 715 System on Chip Design and Test. Lecture 22

Transcription:

Attacking of Stream Cipher Systems Using a Genetic Algorithm Hameed A. Younis (1) Wasan S. Awad (2) Ali A. Abd (3) (1) Department of Computer Science/ College of Science/ University of Basrah (2) Department of Computer Science and Information Systems/ Technology University (3) Department of Computer Engineering/ College of Engineering/ University of Basrah Abstract Stream cipher is one of the hard electronic cipher systems because of high security and difficulty in breaking it. This work is considered a new approach to cryptanalysis based on the application of direct search algorithm called genetic algorithm. It concentrates on showing the applicability of genetic algorithm concepts as a powerful tool in breaking cryptographic systems. The cryptanalysis is based on attacking stream cipher systems by finding the equivalent linear system. The goal of the genetic algorithm is finding the shortest linear feedback shift register that generates the known key stream through finding the initial state, feedback polynomial, and the shift register length. Previously, there were methods to find the linear equivalence by using Massey algorithm and neural networks. Now, the proposed method is considered the first attempt to find it via genetic algorithm with variable chromosomes lengths within genetic population leading to minimized average number of generations and accordingly less computational time. The proposed artificial system has been applied successfully to break a number of linear and nonlinear stream cipher systems, such as Hadmard system and Bruer system. Introduction Attacking cipher systems can be done by using a number of methods which can be classified into different classes according to the available information: Cipher-text only attack: The cryptanalyst has the cipher text of several messages, all of which have been encrypted using the same encryption algorithm. Known-plaintext attack: The cryptanalyst has access not only to the cipher text of several messages, but also part of the plaintext of these messages. Chosen-plaintext attack: The cryptanalyst not only has access to the cipher text and associated plaintext for several messages, but also chooses the plaintext that gets encrypted. Adaptive chosen plaintext attack: This is a special case of a chosen-plaintext attack. Not only can the cryptanalyst choose the plaintext that is encrypted, but he can also modify his choice based on the results of previous encryption. In this paper, the adopted method is the known-plain text attack. In this method, cipher text and part of the plain text are known [1]. The security of the modern cryptography is based on the key (K).

This paper presents a complete genetic algorithm (GA) to find the linear equivalence of a given key stream through finding: Initial state, feedback function, and shift register length. Stream Cipher Systems Stream cipher systems convert a plain text to a cipher text one bit at time. A key stream generator outputs a stream of bits: K 1, K K i. This key stream is XORed with a stream of plain text bits: P 1 i to produce a stream of cipher text bits C 1 i. At the decryption end, the cipher text bits are XORed with an identical key stream to recover the plain text bits as shown in Fig. (1)[2]: Key Binary Key stream Cipher Text Binary Plaintext Figure (1): Stream Cipher Encryption System The main component of the key stream generator is the linear feedback shift register (LFSR) which consists of two parts: shift register and feedback function as shown in Fig. (2). b n b n-1 b 3 b 2 b 1 Output bit Feedback Function Figure (2): Linear Feedback Shift Register (LFSR) Each time a bit is needed; all the bits in the shift register are shifted to the right. The new leftmost bit is computed as a function of the other bits [2]. The period of the shift register is the length of the output sequence before it starts repeating. Linear Equivalence A binary sequence may be generated by using more than one LFSR. The shortest LFSR generating that sequence is called the linear equivalence. The characteristics polynomial for this LFSR is called the minimal polynomial with degree equal to the linear equivalence. Furthermore, the number of bits for the LFSR is equal to that of the linear equivalence of the sequence generated from that register.

Attacking Methods The attacking methods of stream cipher systems can be classified, based on the information processing approaches, into two major parts: Classical methods, and Modern methods. The classical methods include: Matrix method, Berlekamp-Massey algorithm, and Correlation and fast correlation methods. The modern methods include: Neural network method and Genetic algorithm method. In matrix method, if n is the linear equivalence of the sequence of keystream, then we must know at least (2n) consecutive bits of the sequence (keystream) [3], while the iterative algorithm introduced by Berlekamp-Massey is the shortest linear feedback shift register, capable of generating a finite sequence of bits [3]. Siegenthaler (1985) demonstrated a method that LFSRi part of key can be found independently of the other LFSRs and Staffelbach (1988) developed two algorithms (A and B), which are much faster than the above attack (Siegenthaler). On the other hand, the modern methods depend on different approaches for information processing such as biological-like processing. Abbas N.M. [4] showed the applicability of multilayer neural networks with back propagation to crack a linear stream cipher with LFSR as a key generator, assuming that the cryptanalyst has obtained a finite sequence of known plaintext. Spillman et al [5] showed the use of genetic algorithm in the cryptanalysis of simple substitution ciphers. Mattews et al [6] demonstrated the use of genetic algorithms to break classical transposition ciphers by finding the transposition sequence used. A-Ageelee S.A. [7] developed a correlation attack by using genetic algorithm to reduce the number of attempts. Application of the Proposed Algorithm to the Key Generation In this work the main goal of using GA is to find the equivalent LFSR which leads to get the feedback polynomial, the initial state, and the length of the LFSR, knowing part of the plain text. The first step is started with getting the key representation. The key is represented as a binary string (binary chromosome). This chromosome should be variable lengths and have an even length Lx. The chromosome is divided into two parts one for the feedback function and the other for the initial state of the LFSR equivalent to the attacked generator as shown in Fig. (3). a 0 a 1 a Feedback Initial State Polynomial Coefficients Figure (3): Chromosome Structure in the GA population

The second step is to get the fitness function that evaluates the fitness of each string in the population. The fitness function adopted in this work may be: F(x)=(2*(L s -e))/ L x Where: F(x): is the adopted fitness function., Ls: is the length of the input (known or given) keystream., e: is the difference between the generated sequence and the given sequence., Lx: Chromosome length. The following parameters have been chosen for the adopted genetic algorithm: 1. Selection strategy: Roulette wheel selection. 2. Crossover: 2-point crossover. 3. Replacement Policy: Both parents replacement. 4. Termination condition: e=0(i.e. F(x) =2Ls/Lx) or maximum number of generations is reached. Fig.(4) shows a complete flow chart that represents the proposed genetic algorithm adopted for the stream cipher attacking. Input t=0 Generate the initial population randomly Evaluate the fitness of each chromosome t<maxgen No Output Yes t=t+1 Select two chromosomes based on fitness Perform the crossover operator Perform the mutation operator Insert the two offspring into the new pop. Figure (4): Flow chart of the proposed genetic

Experimental Results The simulation of the proposed algorithm is programmed. It is applied to sequences, which are created using stream cipher systems whose combining functions are linear feedback functions and nonlinear feedback functions (Hadmard and Bruer systems). Experiment 1: This experiment is done to select the optimum values for crossover and mutation probabilities. The results are shown in Table (1) and Table (2) below: Table (1): Optimum values for P c P c Average number of generations 0.3 26 0.5 29 0.7 23 0.8 25 0.9 22 1.0 24 Table (2): Optimum values for P m P m Average number of generations 0.0001 21 0.001 17 0.03 21 0.05 22 0.09 24 0.1 23 0.2 25 0.3 23 From the above results we found that the crossover rate for a minimum average number of generations is 0.9 and the mutation rate is 0.001. Fig.(5) below shows these results graphically. 35 30 Average No. of Generations 30 25 20 15 10 Average No. of Generations 25 20 15 10 5 5 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 Pc 0 0 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1 Pm Figure (5): Results of Crossover and Mutation Probabilities

Experiment 2: In this experiment, a linear stream cipher is chosen with different LFSR lengths and the corresponding average number of generations. The results are shown in Table (3) below: Table (3): Results for different LFSR lengths LFSR length Known key stream length (2n) Average number of Generations 5 10 22 6 12 53 7 14 21 8 16 97 From the above results, we conclude that whenever the length of the shift register (key size) increases, the average number of generations increases too. Experiment 3: This experiment is for examining the effect of the known key stream length on the required number of generations. Linear stream cipher with shift register of length 5 bits is chosen. Table (4) below gives the results, in which we note that the average number of generations is zero when the length of the known key stream is less than twice the value of the linear equivalence. We may note also that whenever the length of the known key stream increases, the average number of generations decreases leading to a shortest computational time for the GA. Table (4): Results of Experiment 3 Key stream Known key length (2n) stream length 5 10 5 0 5 10 10 67 5 10 15 53 5 10 20 42 5 10 30 35 LFSR length Average number of generations Experiment 4: In this experiment, two nonlinear stream cipher systems, which are Hadmard and Bruer systems, are adopted. The obtained results are summarized in Table (5) below. Table (5): Results of Experiment 5 System name LFSR length Known key stream length Average number of generations Hadmard 2,3 12 85 Bruer 2,3 12 98 The average number of generations of Bruer system is greater than that of the Hadmard system because the nonlinearity degree of Bruer system is greater. Furthermore, we note that

the nonlinear systems need more time to be broken than the linear systems because the nonlinearity degree of the key generator is greater. Conclusions The work of this paper has developed a genetic algorithm for breaking stream cipher systems with a known plaintext attack. This algorithm should find the shortest LFSR which generates a sequence of key stream knowing part of it. The proposed system requires less computational time and information compared to the previous works, in which GA is used to reduce the number of trails when treating with nonlinear systems. A final conclusion is that the nonlinear stream cipher systems need more time for breaking it than the linear systems because the degree of nonlinearity is greater. References -Wesley Publishing Company Inc., USA, 1982. and Sons Inc., USA, 1996. [4] Abbas N.M., University, Baghdad, 1996. [5] Spillman R., et al -44, Jan. 1993. No.2, pp. 187-201, April 1993. [7] Al- Ph.D. Thesis, Technology University, Baghdad, 1998.