Cryptanalysis of Geffe Generator Using Genetic Algorithm | SpringerLink
Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 259))

Abstract

The use of basic crypto-primitives or building blocks has a vital role in the design of secure crypto algorithms. Such crypto primitives must be analyzed prior to be incorporated in crypto algorithm. In cryptanalysis of any crypto algorithm, a cryptanalyst generally deals with intercepted crypts without much auxiliary information available to recover plaintext or key information. As brute force attack utilizes all possible trials exhaustively, it has high computing time complexity due to huge search space and hence is practically infeasible to mount on secure crypto algorithms. The Geffe generator is a non-linear binary key sequence generator. It consists of three linear feedback shift registers and a nonlinear combiner. In this paper, we attempt Geffe generator to find initial states of all three shift registers used. The initial states are the secret key bits that maintain the security of Geffe generator. To find secret key bits, one has to search huge key space exhaustively. We consider divide-and-conquer attack and genetic algorithm to reduce exhaustive searches significantly. Simulation results show that correct initial states of all shift registers can be obtained efficiently.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 34319
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 42899
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Stallings, W.: Cryptography and Network Security. Pearson, London (2012)

    Google Scholar 

  2. Menzes, A., Oorschot, P.V., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1996)

    Google Scholar 

  3. Geffe, P.R.: How to protect data with ciphers that are really hard to break. Electronics 46(1), 99–101 (1973)

    Google Scholar 

  4. Klein, A.: Stream Ciphers. Springer, London (2013)

    Book  MATH  Google Scholar 

  5. Wei, S.: On generalization of Geffe generator. Int. J. Comput. Sci. Netw. Sec. 6(8A), 161–165 (2006)

    Google Scholar 

  6. Jenner, E.: Cryptanalysis of LFSR-based pseudorandom generators—a survey. http://www.erikzenner.name/docs/2004_survey_streamcipher.pdf (2004)

  7. Golic, J.D.: Correlation properties of a general combiner with memory. J. Cryptol. 9(2), 111–126 (1996)

    Article  MATH  Google Scholar 

  8. Penzhorn, W.T., Bruwer, C.S.: New correlation attacks on stream ciphers. In: Proceedings of IEEE AFRICON 2002, pp. 203–208 (2002)

    Google Scholar 

  9. Meier, W., Staffelbach, O.: Fast correlation attacks on stream ciphers. In: Advances in Cryptology—EUROCRYPT ‘88, LNCS 330, pp. 301–314 (1988)

    Google Scholar 

  10. Kholosha, A.: Investigations in the design and analysis of key-stream generator. http://alexandria.tue.nl/extra2/200410591.pdf

  11. Dawson, E., Clark, A.: Divide and conqure attack on certain classes of stream ciphers. Cryptologia 18(1), 25–40 (1994)

    Article  MATH  Google Scholar 

  12. Luengo, I.: Linear and non-linear sequences and applications to stream ciphers. Recent Trends Crypt.—Contemp. Math. 477, 21–46 (2009)

    Article  MathSciNet  Google Scholar 

  13. Davis, L.: The Handbook of Genetic Algorithms. Van Nostrand Reinhold, New Jersey (1991)

    Google Scholar 

  14. Coley, D.A.: An Introduction to Genetic Algorithms for Scientists and Engineers. World Scientific, New Jersey (1999)

    Google Scholar 

  15. Haupt, R.L., Haupt, S.E.: Practical Genetic Algorithms. Wiley, New Jersey (1998)

    Google Scholar 

  16. Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison Wesley, Boston (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maiya Din .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer India

About this paper

Cite this paper

Din, M., Bhateja, A.K., Ratan, R. (2014). Cryptanalysis of Geffe Generator Using Genetic Algorithm. In: Pant, M., Deep, K., Nagar, A., Bansal, J. (eds) Proceedings of the Third International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 259. Springer, New Delhi. https://doi.org/10.1007/978-81-322-1768-8_45

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1768-8_45

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-1767-1

  • Online ISBN: 978-81-322-1768-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics