Fast correlation attacks on certain stream ciphers
Journal of Cryptology
Elements of information theory
Elements of information theory
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
ACM Computing Surveys (CSUR)
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Intrinsic Statistical Weakness of Keystream Generators
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
The Shrinking Generator: Some Practical Considerations
Fast Software Encryption, Cambridge Security Workshop
Towards fast correlation attacks on irregularly clocked shift registers
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Alternating step generators controlled by De Bruijn sequences
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Correlation Analysis of the Shrinking Generator
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
New guess-and-determine attack on the self-shrinking generator
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
On the rate of coincidence of two clock-controlled combiners
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
Some attacks on the bit-search generator
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
A fast correlation attack on the shrinking generator
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
Improvement of the edit distance attack to clock-controlled LFSR-Based stream ciphers
EUROCAST'05 Proceedings of the 10th international conference on Computer Aided Systems Theory
Distinguishing stream ciphers with convolutional filters
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Practical attack on the shrinking generator
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Hi-index | 0.00 |
The Shrinking Generator and the Alternating Step Generator are two of the most well known clock-controlled stream ciphers. We consider correlation attacks on these two generators, based on an identified relation to the decoding problem for the deletion channel and the insertion channel, respectively. Several ways of reducing the decoding complexity are proposed and investigated, resulting in "divide-and-conquer" attacks on the two generators having considerably lower complexity than previously known attacks.