Fast correlation attacks on stream ciphers
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Fast correlation attacks on certain stream ciphers
Journal of Cryptology
AUSCRYPT '90 Proceedings of the international conference on cryptology on Advances in cryptology
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Fundamentals of Convolutional Coding
Fundamentals of Convolutional Coding
A method for finding codewords of small weight
Proceedings of the 3rd International Colloquium on Coding Theory and Applications
A Comparison of Fast Correlation Attacks
Proceedings of the Third International Workshop on Fast Software Encryption
Proceedings of the Third International Workshop on Fast Software Encryption
Decrypting a Class of Stream Ciphers Using Ciphertext Only
IEEE Transactions on Computers
On a fast correlation attack on certain stream ciphers
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks on stream ciphers via convolutional codes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Iterative decoding of binary block and convolutional codes
IEEE Transactions on Information Theory
A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Nonlinearity Bounds and Constructions of Resilient Boolean Functions
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Fast Correlation Attacks through Reconstruction of Linear Polynomials
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Decimation Attack of Stream Ciphers
INDOCRYPT '00 Proceedings of the First International Conference on Progress in Cryptology
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Fast Correlation Attack Algorithm with List Decoding and an Application
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding
Proceedings of the 8th IMA International Conference on Cryptography and Coding
Cryptanalysis of Stream Ciphers with Linear Masking
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Grain-128a: a new version of Grain-128 with optional authentication
International Journal of Wireless and Mobile Computing
A new simple technique to attack filter generators and related ciphers
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
On bent and highly nonlinear balanced/resilient functions and their algebraic immunities
AAECC'06 Proceedings of the 16th international conference on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
A new distinguisher for clock controlled stream ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
On boolean functions with generalized cryptographic properties
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Probabilistic algebraic attacks
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Correlation attacks on combination generators
Cryptography and Communications
A survey on fast correlation attacks
Cryptography and Communications
On the algebraic attack against summation type keystream generators
International Journal of Information and Computer Security
Hi-index | 0.00 |
This paper describes new methods for fast correlation attacks on stream ciphers, based on techniques used for constructing and decoding the by now famous turbo codes. The proposed algorithm consists of two parts, a preprocessing part and a decoding part. The preprocessing part identifies several parallel convolutional codes, embedded in the code generated by the LFSR, all sharing the same information bits. The decoding part then finds the correct information bits through an iterative decoding procedure. This provides the initial state of the LFSR.