Fast correlation attacks on certain stream ciphers
Journal of Cryptology
Solving a class of stream ciphers
Cryptologia
On the linear syndrome method in cryptoanalysis
CRYPTO '88 Proceedings on Advances in cryptology
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
On the Linear Consistency Test (LCT) in Cryptanalysis with Applications
CRYPTO '89 Proceedings of the 9th Annual International Cryptology Conference on Advances in Cryptology
An Improved Linear Syndrome Algorithm in Cryptanalysis With Applications
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Intrinsic Statistical Weakness of Keystream Generators
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
On the Security of Shift Register Based Keystream Generators
Fast Software Encryption, Cambridge Security Workshop
Decrypting a Class of Stream Ciphers Using Ciphertext Only
IEEE Transactions on Computers
Correlation Analysis of the Shrinking Generator
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Cryptanalysis of Achterbahn-version 1 and -version 2
Journal of Computer Science and Technology
New Stream Cipher Designs
An efficient cryptosystem Delta for stream cipher applications
Computers and Electrical Engineering
Modified clock-controlled alternating step generators
Computer Communications
On Effectiveness of Clock Control in Stream Ciphers
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Encryption System with Variable Number of Registers
Computers and Electrical Engineering
Linear statistical weakness of alleged RC4 keystream generator
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Cryptanalysis of alleged A5 stream cipher
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Clock-controlled shrinking generator of feedback shift registers
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Predicting the shrinking generator with fixed connections
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Pseudorandom sequences and stream ciphers
Algorithms and theory of computation handbook
A new distinguisher for clock controlled stream ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Distinguishing stream ciphers with convolutional filters
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Hi-index | 0.00 |
A theoretical framework for fast correlation attacks on irregularly clocked linear feedback shift registers (LFSRs) based on a recently established linear statistical weakness of decimated LFSR sequences is developed. When the LFSR feedback polynomial is not known, methods for the statistical weakness detection and the feedback polynomial reconstruction are proposed. When the LFSR feedback polynomial is known, an iterative procedure for fast LFSR initial state reconstruction given an observed keystream sequence is introduced. The procedure is based on appropriately defmed parity-check sums and consists in iterative recomputation of the posterior probabilities for unknown elements of the decimation sequence. A convergence condition in terms of the numbers of the parity-check sums needed for successful reconstruction and the required polynomial computational complexity indicate that the proposed fast correlation attack may be realistic, especially in the constrained clocking case. The number of the feedback polynomial multiples of relatively low weight and not too large degree thus proves to be critical for the security of irregularly clocked LFSRs.