A systematic attack on clock controlled cascades

  • Renato Menicocci
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 950)


Cascades of clock controlled shift registers play an important role in the design of pseudorandom generators for stream cipher cryptography. In this paper, an attack for breaking a kind of such cascades is presented.


  1. [1]
    D. GOLLMANN and W.G. CHAMBERS, “Clock Controlled Shift Registers: A Review” IEEE J. Selected Areas Commun., vol. 7, pp. 525–533, May 1989.CrossRefGoogle Scholar
  2. [2]
    R.A. RUEPPEL. “Stream Ciphers” in Contemporary Cryptology (G.J. Simmons, ed.). New York: IEEE Press, 1992.Google Scholar
  3. [3]
    K.C. ZENG, C.H. YANG, D.Y. WEI and T.R.N. RAO. “Pseudorandom Bit Generators in Stream-Cipher Cryptography” Computer 24, 2 (1991), pp. 8–17.CrossRefGoogle Scholar
  4. [4]
    R. MENICOCCI. “Cryptanalysis of a Two-Stage Gollmann Cascade Generator” Proc. SPRC '93 (W. Wolfowicz, ed.), pp. 62–69. Rome (Italy), February 1993.Google Scholar
  5. [5]
    R. MENICOCCI. “Short Gollmann Cascade Generators May Be Insecure”. Proc. Fourth IMA Conf. on Cryptography and Coding, Cirencester (UK), Dicember 1993 (to appear).Google Scholar
  6. [6]
    M. MARTURANO. “L'Algoritmo della Sindrome Lineare negli Attacchi Crittanalitici a Correlazione” (in Italian) Laurea Thesis, University “La Sapienza”, Infocom Dept., Rome, 1992.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1995

Authors and Affiliations

  • Renato Menicocci
    • 1
  1. 1.Fondazione Ugo BordoniRomaItaly

Personalised recommendations