A Spectral Approach for Characterizing the Self-Synchronization of - - PowerPoint PPT Presentation

a spectral approach for characterizing the self
SMART_READER_LITE
LIVE PREVIEW

A Spectral Approach for Characterizing the Self-Synchronization of - - PowerPoint PPT Presentation

Context Main result Example Possible exension A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers emy Parriaux 1 Philippe Guillot 2 erioux 1 J er Gilles Mill Nancy University, CNRS, Research Center for


slide-1
SLIDE 1

Context Main result Example Possible exension

A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

J´ er´ emy Parriaux1 Philippe Guillot2 Gilles Mill´ erioux1

Nancy University, CNRS, Research Center for Automatic Control of Nancy (CRAN UMR 7039), France, jeremy.parriaux@esstin.uhp-nancy.fr, gilles.millerioux@esstin.uhp-nancy.fr, Paris 8 University Laboratoire Analyse, G´ eom´ etrie et Applications (LAGA UMR 7539), France philippe.guillot@univ-paris8.fr

February 16, 2011

1 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-2
SLIDE 2

Context Main result Example Possible exension

1

Context

2

Main result

3

Example

4

Possible exension

2 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-3
SLIDE 3

Context Main result Example Possible exension

Outline

1

Context

2

Main result

3

Example

4

Possible exension

3 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-4
SLIDE 4

Context Main result Example Possible exension

Self-synchronizing Stream Ciphers

Canonical form hθ

yk uk zk

n

yk−n · · · yk−1 xk hθ

yk

  • uk
  • zk

n

yk−1 · · · yk−n

  • xk

θ key yk cipher-text mk plain-text

  • mk

recovered plain-text xk state of the cipher

  • xk

state of the decipher zk complex sequence

  • zk

complex sequence fθ next-state function hθ

  • utput function

4 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-5
SLIDE 5

Context Main result Example Possible exension

Self-synchronizing Stream Ciphers

Canonical form hθ

yk uk zk

n

yk−n · · · yk−1 xk hθ

yk

  • uk
  • zk

n

yk−1 · · · yk−n

  • xk

Advantages Synchronization of cipher and decipher is structural property Does not require any external synchronization protocol

4 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-6
SLIDE 6

Context Main result Example Possible exension

Self-synchronizing Stream Ciphers

Recursive form hθ

yk uk zk

n

xk fθ

n

n hθ

yk

  • uk
  • zk

n

  • xk

n

n

5 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-7
SLIDE 7

Context Main result Example Possible exension

Self-synchronizing Stream Ciphers

Recursive form hθ

yk uk zk

n

xk fθ

n

n hθ

yk

  • uk
  • zk

n

  • xk

n

n

Question How to characterize the functions fθ so that ∀k > kt the state xk does not depend on the initial state x0 ? Is there any non strict T function fθ that can be used ?

5 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-8
SLIDE 8

Context Main result Example Possible exension f0 f1 fn−2 fn−1 y x0 x1 xn−2 xn−1

strict T-function (parameter) f0(y) f1(y, x0) . . . fn−2(y, x0, . . . , xn−4, xn−3) fn−1(y, x0, . . . , . . . , xn−3, xn−2) Non strict T-function f0(y, x0, . . . , xn−2, xn−1) f1(y, x0, . . . , xn−2, xn−1) . . . fn−2(y, x0, . . . , xn−2, xn−1) fn−1(y, x0, . . . , xn−2, xn−1)

6 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-9
SLIDE 9

Context Main result Example Possible exension f0 f1 fn−2 fn−1 y x0 x1 xn−2 xn−1

strict T-function (parameter) f0(y) f1(y, x0) . . . fn−2(y, x0, . . . , xn−4, xn−3) fn−1(y, x0, . . . , . . . , xn−3, xn−2) Non strict T-function f0(y, x0, . . . , xn−2, xn−1) f1(y, x0, . . . , xn−2, xn−1) . . . fn−2(y, x0, . . . , xn−2, xn−1) fn−1(y, x0, . . . , xn−2, xn−1)

6 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-10
SLIDE 10

Context Main result Example Possible exension

Self-synchronization

Definition (Self-Synchronizing sequence) A sequence (y) is self-synchronizing with respect to f if there exists an integer ky so that for all initial state x0 and x0 ∀k ≥ ky, xk = xk Definition (Finite time self-synchronization) The function f is finite time self-synchronizing if the minimum value ky is upper bounded when (y) stands in the set of all input sequences. The upper bound is called the self-synchronization delay of f .

7 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-11
SLIDE 11

Context Main result Example Possible exension

Self-Synchronizing Stream Ciphers

Equations

f yk n xk n xk+1 Decomposition of the next-state function f 0, f 1 : Fn

2 −

→ Fn

2

f (yk, xk) = f 0(xk) if yk = 0 f 1(xk) if yk = 1 (1) Iterated function φi(y, x0) = f (yi, f (yi−1, f (. . . , f (y0, x0) · · · ))) = f yi ◦ f yi−1 ◦ · · · ◦ f y1 ◦ f y0(x0) (2)

8 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-12
SLIDE 12

Context Main result Example Possible exension

Spectral Analysis

Walsh Transform (of a Boolean function f : Fn

2 −

→ F2) ∀v ∈ Fn

2,

fχ(v) =

  • x∈Fn

2

(−1)f (x)+x·v (3) Walsh Matrix (of a vectorial Boolean function f : Fn

2 −

→ Fm

2 )

∀u ∈ Fm

2 , v ∈ Fn 2, w f u,v =

  • x∈Fn

2

(−1)u·f (x)+v·x (4) Composition of vectorial Boolean functions Wf ◦g = 1 2n Wf × Wg (5)

9 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-13
SLIDE 13

Context Main result Example Possible exension

Outline

1

Context

2

Main result

3

Example

4

Possible exension

10 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-14
SLIDE 14

Context Main result Example Possible exension

The system is self-synchronizing with synchronization delay i + 1 ⇐ ⇒ The function φi(y, x0) is constant with respect to x0 (or the function φy

i (x0) is constant)

Walsh matrix of φi restricted to a sequence y ∈ Fi+1

2

Wφy

i =

1 2n·i Wf yi × · · · × Wf y0 (6) Walsh matrix of a constant function      2n · · · ±2n · · · . . . . . . . . . ±2n · · ·     

11 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-15
SLIDE 15

Context Main result Example Possible exension

Finite time self-synchronization

2n · · · w2,1 w2,2 · · · w2,2n . . . . . . . . . w2n,1 w2n,2 · · · w2n,2n               2n · · · w2,1 w2,2 · · · w2,2n . . . . . . . . . w2n,1 w2n,2 · · · w2n,2n               Wf 0 = Wf 1 = W ∗

f 0

W ∗

f 1

Conditions on Wf 0 and Wf 1 Finite time self-synchronization ⇐ ⇒ W ∗

f 0 and W ∗ f 1 generate a nilpotent semigroup.

12 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-16
SLIDE 16

Context Main result Example Possible exension

Nilpotent reduced Walsh matrix

Nilpotent deduced Walsh matrix Triangular reduced Walsh matrix ⇔ strict T-function Levitzky: Any semigroup of nilpotent operators is triangularizable Three kinds of nilpotent Walsh matrices

1

those which are already triangular fT

2

those that can be triangularized by a change of basis whose matrix is a Walsh matrix (b ◦ fT ◦ b−1)

3

those that cannot be triangularized with such a matrix Remark If two reduced Walsh matrices W ∗

f 0, W ∗ f 1 span a nilpotent semigroup of

nilpotency class greater than n, it necessary corresponds to Case 3.

13 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-17
SLIDE 17

Context Main result Example Possible exension

Outline

1

Context

2

Main result

3

Example

4

Possible exension

14 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-18
SLIDE 18

Context Main result Example Possible exension

Let f : F2 × Fn

2 −

→ Fn

2 (n = 3) be,

f (y, x) = (y + 1)f 0(x) + yf 1(x) with    f 0

0 (x) =

x1 + x0x1 + x2 + x0x2 f 0

1 (x) =

x1 + x0x1 + x0x2 + x1x2 + x0x1x2 f 0

2 (x) =

x2 + x0x2 and    f 1

0 (x) =

x0x1 + x0x2 + x1x2 f 1

1 (x) =

x2 + x0x1x2 f 1

2 (x) =

x1x2 The class of nilpotency of the semigroup generated by W ∗

f 0 and W ∗ f 1 is

C = 4 > n. It can only be achieved in Case 3.

15 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-19
SLIDE 19

Context Main result Example Possible exension

Outline

1

Context

2

Main result

3

Example

4

Possible exension

16 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers

slide-20
SLIDE 20

Context Main result Example Possible exension

Extension to statistical self-synchronization

Definition (Statistical self-synchronization) A function f is statistically self-synchronizing if lim

k→+∞ Prob(KY ≤ k) = 1, where KY is the random synchronization delay

for the random sequence (Y ).

17 / 17 J´ er´ emy Parriaux, Philippe Guillot, Gilles Mill´ erioux A Spectral Approach for Characterizing the Self-Synchronization of Stream Ciphers