Towards Exploring Fundamental Limits of System-Specific Cryptanalysis Within Limited Attack Classes: Application to ABSG
A new approach on cryptanalysis is proposed where the goal is to explore the fundamental limits of a specific class of attacks against a particular cryptosystem. As a first step, the approach is applied on ABSG, which is an LFSR-based stream cipher where irregular decimation techniques are utilized. Consequently, under some mild assumptions, which are common in cryptanalysis, the tight lower bounds on the algorithmic complexity of successful Query-Based Key-Recovery attacks are derived for two different setups of practical interest. The proofs rely on the concept of ``typicality’’ of information theory.
💡 Research Summary
This paper introduces a novel methodological framework for cryptanalysis that focuses on deriving fundamental performance limits for a specific class of attacks against a particular cryptosystem. Rather than following the traditional dichotomy—generic attacks applicable to many ciphers versus highly specialized attacks tailored to a single cipher—the authors merge the two perspectives. They fix both the target algorithm (ABSG, an LFSR‑based stream cipher that employs irregular decimation) and a broad family of attacks called Query‑Based Key‑Recovery (QuBaR) attacks, and then ask: “What is the best achievable complexity for any successful attack within this family?”
The paper first formalizes the operation of ABSG. The internal state sequence (Y) evolves according to a deterministic mapping driven by the input bit stream (X). An output bit is produced only when the internal state becomes the special symbol (\emptyset). By defining the indices (H_i) of successive (\emptyset) symbols and the gaps (Q_i = H_i - H_{i-1} - 2), the authors show (Lemma 3.1) that, under the natural assumption that the input bits are i.i.d. Bernoulli(½), the random variables (Q_i) are i.i.d. geometric with parameter ½. Consequently, recovering the secret key of ABSG is mathematically equivalent to correctly guessing the entire sequence ({Q_i}_{i=1}^N).
Theorem 3.1 establishes three equivalent formulations of the key‑recovery problem: (1) obtaining any (L) independent linear equations in the unknown LFSR bits, (2) obtaining any (L) consecutive LFSR bits, and (3) correctly guessing the (Q)-sequence. This equivalence reduces the cryptanalytic task to a well‑defined statistical estimation problem.
A QuBaR attack is defined as an iterative process: generate a guess (G_k), run a verification oracle (T(G_k)) that returns 1 iff the guess matches the secret, and stop when a successful guess is found. A guess for ABSG is a triple ((i,\theta,\mathbf{q})) where (\mathbf{q}) denotes a candidate subsequence of the (Q)-variables satisfying the length condition (2\theta + \beta \ge L) (with (\beta) the sum of the guessed (q)’s). This abstract model captures a wide range of concrete attacks, including time‑memory trade‑off, correlation, and algebraic attacks.
The core contributions are two tight lower bounds on the computational effort required for any successful QuBaR attack.
-
Exhaustive‑Search‑Type QuBaR attacks – a subclass where the attacker systematically enumerates all possible (\mathbf{q}) candidates. Theorem 4.2 proves that any such attack must perform at least (2^{\alpha L}) operations, where (\alpha) is a constant (the paper’s first‑order analysis yields (\alpha \approx 2/3)). Theorem 4.1 shows that the “most probable choice” attack described in the original ABSG paper attains this bound to the first exponential order, establishing achievability.
-
General QuBaR attacks – the full class allowing arbitrary ordering of guesses, adaptive strategies, and any amount of pre‑computation. Theorem 5.2 demonstrates that even with optimal guessing strategies the expected number of queries needed grows as (2^{L}) (first‑order exponent 1). Theorem 5.1 again confirms that the known “most probable choice” attack meets this bound, so the lower bound is tight.
The analysis relies on information‑theoretic typicality: the probability that a randomly drawn guess matches the true (Q)-sequence is essentially the probability of a typical sequence under the geometric distribution, which decays exponentially with the length of the guessed segment. By carefully counting the number of distinct guesses that satisfy the length constraint, the authors translate this decay into a lower bound on the number of required queries.
Assumptions A1–A4 (i.i.d. input, availability of a sufficiently long output, unknown feedback polynomial, and large LFSR degree) are standard in stream‑cipher cryptanalysis and make the results broadly applicable. Because the derivations depend only on the statistical properties of the (Q)-process, the same methodology can be extended to other irregular‑decimation generators (e.g., shrinking, self‑shrinking, or bit‑search generators).
In summary, the paper provides a rigorous, quantitative answer to the question “what is the best possible attack complexity within a given attack class?” for ABSG. It shows that, under realistic assumptions, any QuBaR attack must incur exponential time, and that the known “most probable choice” attack is essentially optimal. This framework gives designers a concrete, provable security metric for the chosen attack class, and gives analysts a principled way to discard whole families of ineffective attacks without exhaustive empirical testing. The work therefore represents a significant step toward a more systematic, theory‑driven cryptanalysis.
Comments & Academic Discussion
Loading comments...
Leave a Comment