Strategic attack on the shrinking generator

  • Authors:
  • A. Fúster-Sabater;P. Caballero-Gil

  • Affiliations:
  • Institute of Applied Physics (C.S.I.C.), Serrano 144, 28006 Madrid, Spain;Department of Statistics, Operations Research and Computing, Faculty of Mathematics, University of La Laguna, 38271 Tenerife, Spain

  • Venue:
  • Theoretical Computer Science
  • Year:
  • 2008

Quantified Score

Hi-index 5.23

Visualization

Abstract

The shrinking generator is a simple keystream generator with applications in stream ciphers, which is still considered as a secure generator. This work shows that, in order to cryptanalyze it, fewer intercepted bits than indicated by the linear complexity are necessary. Indeed, whereas the linear complexity of shrunken sequences is between A@?2^(^S^-^2^) and A@?2^(^S^-^1^), we claim that the initial states of both component registers are easily computed with fewer than A@?S shrunken bits located at particular positions. Such a result is proven thanks to the definition of shrunken sequences as interleaved sequences. Consequently, it is conjectured that this statement can be extended to all interleaved sequences. Furthermore, this paper confirms that certain bits of the interleaved sequences have a greater strategic importance than others, which must be considered as a proof of weakness of interleaved generators.