Analysis and design of stream ciphers
Analysis and design of stream ciphers
On functions of linear shift register sequences
Proc. of a workshop on the theory and application of cryptographic techniques on Advances in cryptology---EUROCRYPT '85
Root Counting, the DFT and the Linear Complexity of Nonlinear Filtering
Designs, Codes and Cryptography
Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar
Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar
A New Attack on the Filter Generator
IEEE Transactions on Information Theory
Sequences, DFT and Resistance against Fast Algebraic Attacks
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
On the Number of Linearly Independent Equations Generated by XL
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Hi-index | 0.00 |
The filter generator consists of a linear feedback shift register (LFSR) and a Boolean filtering function that combines some bits from the shift register to create a key stream. A new attack on the filter generator has recently been described by Rønjom and Helleseth [6]. This paper gives an alternative and extended attack to reconstruct the initial state of the LFSR using the underlying subspace structure of the filter sequence. This improved attack provides further insight and more flexibility in performing the attack by Rønjom and Helleseth. The main improvements are that this attack does not use the coefficient sequences that were fundamental in the previous attack and also works in the unlikely cases when the original attack needed some modifications.