CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Shift Register Sequences
The LILI-II Keystream Generator
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Correlation Analysis of the Alternating Step Generator
Designs, Codes and Cryptography
A generalized correlation attack with a probabilistic constrained edit distance
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
A simple attack on some clock-controlled generators
Computers & Mathematics with Applications
Pseudorandom generator to strengthen cooperation in VANETs
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part II
Lightweight authentication for RFID used in VANETs
EUROCAST'11 Proceedings of the 13th international conference on Computer Aided Systems Theory - Volume Part II
Hi-index | 0.00 |
The main idea behind this paper is to improve a known plaintext divide-and-conquer attack that consists in guessing the initial state of a Linear Feedback Shift Register component of a keystream generator, and then trying to determine the other variables of the cipher based on the intercepted keystream. While the original attack requires the exhaustive search over the set of all possible initial states of the involved register, this work presents a new and simple heuristic optimization of such an approach that avoids the evaluation of an important number of initial states when launching a constrained edit distance attack on irregularly clocked shift registers.