Advertisement

A Security Enhancement of the E0 Cipher in Bluetooth System

  • HyeongRag Kim
  • HoonJae Lee
  • SangJae Moon
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4953)

Abstract

Summation generator was analyzed by Dawson’s divide-and-conquer- attack[1] and showed us the weakness by Golic’s correlation attack[3] and Meier’s Fast correlation attack[4]. In this paper, We propose a Circular-Clock-Controlled Summation Generator(CCC-SG), an enhanced E0 algorithm for GSM system, and analyze the security aspects and the performances.

Keywords

Cryptosystem CCC-SG Stream cipher 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Dawson, E.: Cryptanalysis of Summation generator. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 209–215. Springer, Heidelberg (1993)Google Scholar
  2. 2.
    Rueppel, R.: Correlation Immunity and the Summation Generator. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 260–272. Springer, Heidelberg (1986)Google Scholar
  3. 3.
    Golic, J., Salmasizadeh, M., Dawson, E.: Fast Correlation Attacks on the summation Generator. Journal of cryptology 13(2), 245–262 (2000)zbMATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    Meier, W., Staffelbach, O.: Correlation Properties of combiners with Memory in Stream Ciphers. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 204–213. Springer, Heidelberg (1991)CrossRefGoogle Scholar
  5. 5.
    Specification on the Bluetooth System, version 1.1 February 22 (2001)Google Scholar
  6. 6.
    Massey, J.: Shift-Register Synthesis and BCH Decoding. IEEE Transactions on Information Theory IT15(1), 122–127 (1969)CrossRefMathSciNetGoogle Scholar
  7. 7.
    Jonsson, F., Johansson, T.: A fast correlation attack on LILI-128. Information Processing Letters 80(3), 122–127 (2003)MathSciNetGoogle Scholar
  8. 8.
    Babbage, S.: Improved exhaustive search attacks on stream cipher. In: European Convention on Security and Detection, IEEE Conference Publication, vol. 408, pp. 161–166 (1995)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • HyeongRag Kim
    • 1
  • HoonJae Lee
    • 2
  • SangJae Moon
    • 3
  1. 1.Dept. of Computer ApplicationPohang CollegePohangKorea
  2. 2.School of Computer EngineeringDongseo UniversityBusanKorea
  3. 3.School of Electrical Eng. &Computer ScienceKyungpook Nat’l Univ.DaeguKorea

Personalised recommendations