Skip to main content

Improvement of the Edit Distance Attack to Clock-Controlled LFSR-Based Stream Ciphers

  • Conference paper
Book cover Computer Aided Systems Theory – EUROCAST 2005 (EUROCAST 2005)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 3643))

Included in the following conference series:

Abstract

The main idea behind this paper is to improve a known plaintext divide-and-conquer attack that consists in guessing the initial state of a Linear Feedback Shift Register component of a keystream generator, and then trying to determine the other variables of the cipher based on the intercepted keystream. While the original attack requires the exhaustive search over the set of all possible initial states of the involved register, this work presents a new and simple heuristic optimization of such an approach that avoids the evaluation of an important number of initial states when launching a constrained edit distance attack on irregularly clocked shift registers.

Research supported by the Spanish Ministry of Education and Science and the European FEDER Fund under Projects SEG2004-04352-C04-03 and SEG2004-02418.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, R.J.: A Faster Attack on Certain Ciphers. Electronics Letters 29(15), 1322–1323 (1993)

    Article  Google Scholar 

  2. Bluetooth, Specifications of the Bluetooth system, Version 1.1 (February 2001), available at http://www.bluetooth.com/

  3. Clark, A., et al.: The LILI-II Keystream Generator. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 25–39. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  4. Coppersmith, D., Krawczyk, H., Mansour, H.: The Shrinking Generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 22–39. Springer, Heidelberg (1994)

    Google Scholar 

  5. CRYPTREC project- cryptographic evaluation for Japanese Electronic Government, http://www.ipa.go.jp/security/enc/CRYPTREC/index-e.html

  6. Golic, J.D.: Recent Advances in Stream Cipher Cryptanalysis. Publication de l’Institut Mathematique Tome 64(78), 183–204 (1998)

    MathSciNet  Google Scholar 

  7. Golic, J.D., Menicocci, R.: Correlation Analysis of the Alternating Step Generator. Design Codes and Cryptography 31(1), 51–74 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  8. Golic, J.D., Mihaljevic, M.: A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. Journal of Cryptology 3(3), 201–212 (1991)

    Article  MATH  MathSciNet  Google Scholar 

  9. Golic, J.D., Petrovic, S.: A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 472–476. Springer, Heidelberg (1993)

    Chapter  Google Scholar 

  10. Gollmann, D., Chambers, W.C.: Clock-Controlled Shift Registers: A Review. IEEE Transactions on Selected Areas in Communications SAC-7, 525–533 (1989)

    Article  Google Scholar 

  11. Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)

    Google Scholar 

  12. GSM, Global Systems for Mobile Communications, available at http://cryptome.org/gsm-a512.htm

  13. Jiang, S., Gong, G.: On Edit Distance Attack to Alternating Step Generator, Technical Report Corr2002-28, University of Waterloo (2002)

    Google Scholar 

  14. Johansson, T.: Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 342–356. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  15. Petrovic, S., Fúster, A.: Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 427–439. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Caballero-Gil, P., Fúster-Sabater, A. (2005). Improvement of the Edit Distance Attack to Clock-Controlled LFSR-Based Stream Ciphers. In: Moreno Díaz, R., Pichler, F., Quesada Arencibia, A. (eds) Computer Aided Systems Theory – EUROCAST 2005. EUROCAST 2005. Lecture Notes in Computer Science, vol 3643. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11556985_46

Download citation

  • DOI: https://doi.org/10.1007/11556985_46

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-29002-5

  • Online ISBN: 978-3-540-31829-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics