Improvement of the Edit Distance Attack to Clock-Controlled LFSR-Based Stream Ciphers

  • Pino Caballero-Gil
  • Amparo Fúster-Sabater
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3643)

Abstract

The main idea behind this paper is to improve a known plaintext divide-and-conquer attack that consists in guessing the initial state of a Linear Feedback Shift Register component of a keystream generator, and then trying to determine the other variables of the cipher based on the intercepted keystream. While the original attack requires the exhaustive search over the set of all possible initial states of the involved register, this work presents a new and simple heuristic optimization of such an approach that avoids the evaluation of an important number of initial states when launching a constrained edit distance attack on irregularly clocked shift registers.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Anderson, R.J.: A Faster Attack on Certain Ciphers. Electronics Letters 29(15), 1322–1323 (1993)CrossRefGoogle Scholar
  2. 2.
    Bluetooth, Specifications of the Bluetooth system, Version 1.1 (February 2001), available at http://www.bluetooth.com/
  3. 3.
    Clark, A., et al.: The LILI-II Keystream Generator. In: Batten, L.M., Seberry, J. (eds.) ACISP 2002. LNCS, vol. 2384, pp. 25–39. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Coppersmith, D., Krawczyk, H., Mansour, H.: The Shrinking Generator. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 22–39. Springer, Heidelberg (1994)Google Scholar
  5. 5.
    CRYPTREC project- cryptographic evaluation for Japanese Electronic Government, http://www.ipa.go.jp/security/enc/CRYPTREC/index-e.html
  6. 6.
    Golic, J.D.: Recent Advances in Stream Cipher Cryptanalysis. Publication de l’Institut Mathematique Tome 64(78), 183–204 (1998)MathSciNetGoogle Scholar
  7. 7.
    Golic, J.D., Menicocci, R.: Correlation Analysis of the Alternating Step Generator. Design Codes and Cryptography 31(1), 51–74 (2004)MATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Golic, J.D., Mihaljevic, M.: A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. Journal of Cryptology 3(3), 201–212 (1991)MATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Golic, J.D., Petrovic, S.: A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance. In: Rueppel, R.A. (ed.) EUROCRYPT 1992. LNCS, vol. 658, pp. 472–476. Springer, Heidelberg (1993)CrossRefGoogle Scholar
  10. 10.
    Gollmann, D., Chambers, W.C.: Clock-Controlled Shift Registers: A Review. IEEE Transactions on Selected Areas in Communications SAC-7, 525–533 (1989)CrossRefGoogle Scholar
  11. 11.
    Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)Google Scholar
  12. 12.
    GSM, Global Systems for Mobile Communications, available at http://cryptome.org/gsm-a512.htm
  13. 13.
    Jiang, S., Gong, G.: On Edit Distance Attack to Alternating Step Generator, Technical Report Corr2002-28, University of Waterloo (2002)Google Scholar
  14. 14.
    Johansson, T.: Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 342–356. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  15. 15.
    Petrovic, S., Fúster, A.: Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario. In: López, J., Qing, S., Okamoto, E. (eds.) ICICS 2004. LNCS, vol. 3269, pp. 427–439. Springer, Heidelberg (2004)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Pino Caballero-Gil
    • 1
  • Amparo Fúster-Sabater
    • 2
  1. 1.D.E.I.O.C. University of La LagunaLa LagunaSpain
  2. 2.Institute of Applied Physics. C.S.I.C. Serrano 144MadridSpain

Personalised recommendations