Analysis and design of stream ciphers
Analysis and design of stream ciphers
Fast correlation attacks on certain stream ciphers
Journal of Cryptology
Nonlinearity criteria for cryptographic functions
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Elements of information theory
Elements of information theory
Generalized Inversion Attack on Nonlinear Filter Generators
IEEE Transactions on Computers
Fundamentals of Convolutional Coding
Fundamentals of Convolutional Coding
Shift Register Sequences
Information Theory and Reliable Communication
Information Theory and Reliable Communication
Fast Correlation Attacks Based on Turbo Code Techniques
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
On the Security of Nonlinear Filter Generators
Proceedings of the Third International Workshop on Fast Software Encryption
Improved fast correlation attacks on stream ciphers via convolutional codes
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Improved fast correlation attacks using parity-check equations of weight 4 and 5
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Iterative decoding of binary block and convolutional codes
IEEE Transactions on Information Theory
A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Hi-index | 0.00 |
This paper presents a new deterministic attack against stream ciphers based on a nonlinear filter key-stream generator. By "deterministic" we mean that it avoids replacing the non-linear Boolean function by a probabilistic channel. The algorithm we present is based on a trellis, and essentially amounts to a Viterbi algorithm with a {0, 1}-metric. The trellis is derived from the Boolean function and the received key-stream. The efficiency of the algorithm is comparable to Golic et al.'s recent "generalized inversion attack" but uses an altogether different approach : it brings in a novel cryptanalytic tool by calling upon trellis decoding.