再同步攻击在 Maiorana-McFarland (公里) 功能过滤并且与线性再同步机制装备了的溪流零上被建议。建议攻击利用再同步机制的线性软弱,公里的部分线性工作,并且使用线性一致性测试方法恢复秘密钥匙。一个公里函数不应该被自己,但是相当在联合在使用线性机制阻止建议攻击的流零与另外的非线性的部件实现,这被显示出。尽管有他们的高效率,线性再同步机制的使用应该在公里功能过滤的溪流零被避免,这也被显示出。
A resynchronization attack is proposed on stream ciphers filtered by Maiorana-McFarland (M-M) functions and equipped with a linear resynchronization mechanism. The proposed attack utilizes the linear weakness of the resynchronization mechanism, the partial linearity of M-M functions, and applies the linear consistency test method to recover the secret key. It is shown that an M-M function should not be implemented by itself but rather in combination with other nonlinear components in stream ciphers using linear mechanisms to prevent the proposed attack. It is also shown that the use of linear resynchronization mechanisms should be avoided despite their high efficiency in stream ciphers filtered by M-M functions.