Constrained many-to-one string editing with memory
Information Sciences—Informatics and Computer Science: An International Journal
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Edit Distance Correlation Attack on the Alternating Step Generator
CRYPTO '97 Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of alleged A5 stream cipher
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |
Several edit probabilities and edit distances incorporating the stop/go clocking in the well-known A5-type keystream generator are proposed. Recursive algorithms for their efficient computation are derived. It is shown how the edit probabilities can be used to mount statistically optimal correlation attacks on any two of the three stop/go clocked shift registers. By using a method for estimating the underlying false alarm probability, it is argued that the minimum output sequence length required to be known for a successful attack is linear in the total length of the respective shift registers.