Introduction to finite fields and their applications
Introduction to finite fields and their applications
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Fast correlation attacks on certain stream ciphers
Journal of Cryptology
Matrix multiplication via arithmetic progressions
Journal of Symbolic Computation - Special issue on computational algebraic complexity
Small-bias probability spaces: efficient constructions and applications
STOC '90 Proceedings of the twenty-second annual ACM symposium on Theory of computing
Learning decision trees using the Fourier spectrum
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
A noisy clock-controlled shift register cryptanalysis concept based on sequence comparison approach
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Linear Models for Keystream Generators
IEEE Transactions on Computers
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Shift Register Sequences
A Probabilistic Correlation Attack on the Shrinking Generator
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
A New Version of the Stream Cipher SNOW
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Guess-and-Determine Attacks on SNOW
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
On the Linear Consistency Test (LCT) in Cryptanalysis with Applications
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
ASIACRYPT '92 Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Intrinsic Statistical Weakness of Keystream Generators
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
On the Security of Shift Register Based Keystream Generators
Fast Software Encryption, Cambridge Security Workshop
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller
Computers and Electrical Engineering
Simple construction of almost k-wise independent random variables
SFCS '90 Proceedings of the 31st Annual Symposium on Foundations of Computer Science
On Effectiveness of Clock Control in Stream Ciphers
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
64-bit Block ciphers: hardware implementations and comparison analysis
Computers and Electrical Engineering
Towards fast correlation attacks on irregularly clocked shift registers
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks on stream ciphers via convolutional codes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Clock-controlled shrinking generator of feedback shift registers
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
On the efficiency of the clock control guessing attack
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Predicting the shrinking generator with fixed connections
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
A fast correlation attack on the shrinking generator
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
The linear complexity of the self-shrinking generator
IEEE Transactions on Information Theory
Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)
IEEE Transactions on Information Theory
Statistical distinguishers for irregularly decimated linear recurring sequences
IEEE Transactions on Information Theory
Encryption System with Variable Number of Registers
Computers and Electrical Engineering
Performance evaluation of highly efficient techniques for software implementation of LFSR
Computers and Electrical Engineering
Hi-index | 0.00 |
The need for wireless communication systems has increased rapidly in the past few years and wireless communication has become more convenient in business and society. However, the air interface is vulnerable to eavesdropping, hence encryption in wireless communication systems is a necessity to keep sensitive information confidential and to prevent fraud. Furthermore, wireless devices such as Bluetooth devices and mobile phones require an encryption algorithm that is secure, fast and simple to implement. There are several cryptosystems for stream cipher applications such as A5/x used in GSM mobile communications. However, A5/x are vulnerable to cryptanalytic attacks. In this paper, a new clock-controlled cryptosystem intended for hardware implementation is proposed. The design has attractive properties such as simplicity and scalability. The cryptographical properties including period, balancedness, linear complexity and probability distribution are analyzed. The design provides the basic security requirements, and is resistant to known cryptanalytic attacks. It is shown that the irregular clocking introduced provides a certain level of strengthened security against several cryptanalytic attacks. These properties enhance its use as a suitable cryptosystem for stream cipher applications.