DOI QR코드

DOI QR Code

NSG : A Security Enhancement of the E0 Cipher Using Nonlinear Algorithm in Bluetooth System

NSG : 비선형 알고리즘을 이용한 블루투스 E0 암호화시스템의 성능 개선

  • 김형락 (포항대학 컴퓨터응용과) ;
  • 이훈재 (동서대학교 컴퓨터정보공학부) ;
  • 문상재 (경북대학교 전자전기컴퓨터학부)
  • Published : 2009.06.30

Abstract

Summation generator can be easily made as a simple hardware or software and it's period and linear complexity are very high. So it is appropriate to mobile security system for ubiquitous environment. But it showed us the weakness by Golic's correlation attack and Meier's fast correlation attack. In this paper, we proposed a Nonlinear Summation Generator(NSG), which is improved by using LFSR and NFSR(nonlinear feedback shift register), is different from $E_0$ algorithm which use only LFSR in summation generator. It enhanced nonlinearity and is hard to decipher even though the correlation attack or fast correlation attack. We also analyzed the security aspects and the performances for the proposed algorithm.

합산수열 발생기는 간단한 하드웨어 또는 소프트웨어로 구현될 수 있고, 주기와 선형복잡도가 높은 특징이 있어 유비쿼터스 시대의 이동환경 보안장치에 적합하다. 하지만 Golic의 상관성공격과 Meier의 고속 상관성공격에 의해 취약성이 노출되었다. 본 논문에서는 합산 수열 발생기 형태의 $E_0$ 알고리즘에서 LFSR과 비선형 귀환 이동 레지스터 NFSR(nonlinear feedback shift register) 를 조합한 형태로 개선하여 비선형성을 높이고, 상관성 공격 등의 암호해독이 어려운 새로운 알고리즘 NSG를 제안하고, 제안 알고리즘에 대하여 안전성 및 성능을 분석하였다.

Keywords

References

  1. R.Rueppel, 'correlation Immunity and the Summation Generator,' Advances in Cryptology-CRYPTO '85, Lecture Notes in Computer Sciencen, Vol.218, pp.260-272, Springer-Verlag, 1985
  2. E.Dawson, 'Cryptanalysis of Summation generator,' Advances in Cryptology-ASIACRYPT 'Lecture Notes in Computer Science, Vol.718, pp.209-215, Springer-Verlag, 1993 https://doi.org/10.1007/3-540-57220-1_63
  3. J.Golic, M. Salmasizadeh, and E. Dawson, 'fast Correlation Attacks on the summation Generator,' Journal of cryptology, Vol.13, No.2, pp.245-262, 2000 https://doi.org/10.1007/s001459910009
  4. W. Meier and O. staffelbach, 'Correlation Properties of combiners with Memory in Stream Ciphers,' Advances in Cryptology-EUROCRYPT' 90, llLecture Notes in Computer Science, Vol.473, pp.204-213, Springer-Verlag, 1990 https://doi.org/10.1007/3-540-46877-3_18
  5. 'Specification on the Bluetooth System', version 1.1 February, 22, 2001
  6. T. Chang, B. Park, Y. H. Kim, 'An Efficient Inplementation of the D-Homomorphism for Generation of de Bruijn Sequences', IEEE Transactions on Information Theory, 45, 4, 1280-1283, 1999 https://doi.org/10.1109/18.761285
  7. T. Chang, I. Song, 'Cross-Joins in de Bruijn Sequences and Maximum Length Linear Sequences', IEICE Transactions Fundamentals, Vol.E76-A, No.9, pp.1494-1501, September, 1993
  8. Martin Hell, Thomas Johansson, Willi Meier, 'Grain: A stream Cipher for constrained Environments, International Journal of Wireless and Mobile Computing', Vol.2, No.1 pp.86-93, 2007 https://doi.org/10.1504/IJWMC.2007.013798
  9. J. Massey, 'shift-Register Synthesis and BCH Decoding,' IEEE Transcations on Information Theroy, IT-15, No.1, pp.122-127, January, 1969
  10. S. Babbage, 'Improved Exhaustive Search Attacks on Stream cipher', European Convention on Security and Detection, IEEE Conference Publication, Vol.408, pp.161-166, 1995