Correlation immunity and the summation generator
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
On an improved summation generator with 2-bit memory
Signal Processing
Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Fast Correlation Attacks Based on Turbo Code Techniques
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Decrypting a Class of Stream Ciphers Using Ciphertext Only
IEEE Transactions on Computers
PingPong-128, A New Stream Cipher for Ubiquitous Application
ICCIT '07 Proceedings of the 2007 International Conference on Convergence Information Technology
AN INTELLIGENT SECURITY AGENT FOR A RELIABLE CIPHER SYSTEM USING PINGPONG
Cybernetics and Systems
Improved fast correlation attacks on stream ciphers via convolutional codes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Efficient algorithms for solving overdefined systems of multivariate polynomial equations
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
On the efficiency of the clock control guessing attack
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Algebraic attacks on stream ciphers with linear feedback
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
About the XL algorithm over GF(2)
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
A cryptanalytic time-memory trade-off
IEEE Transactions on Information Theory
Correlation-immunity of nonlinear combining functions for cryptographic applications (Corresp.)
IEEE Transactions on Information Theory
Hi-index | 0.00 |
The recently proposed algebraic attack has been proved to be very powerful against certain type of structure dependent cryptographic schemes especially LFSR-based stream ciphers. In this paper, we have investigated the algebraic attack against summation type of keystream generators. We have analysed the algebraic attack for three particular summation type generators: Rueppel's summation generator, LM generator and PingPong keystream generator. The efficiency of the algebraic attack against these generators are compared in terms of time, data and memory complexity. It will be shown that the, Rueppel's summation generator and the LM generator can be broken down with much less complexity compare to the exhaustive key search. However, for the case of PingPong stream cipher, we have found that it is infeasible to recover the secret key based on algebraic attack, mainly due to the irregular clock controlling function employed in the PingPong keystream generator.