Skip to main content

Correlation attacks on up/down cascades

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1438))

Included in the following conference series:

  • 118 Accesses

Abstract

Conditional and unconditional correlation weaknesses of cascades of up/down clocked shift registers are determined. The corresponding systematic correlation attacks are proposed and the conditions for their success are obtained.

This work was done while the first author was with the Information Security Research Centre, Queensland University of Technology, Brisbane, Australia. Part of this work was carried out while the first author was on leave at the Isaac Newton Institute for Mathematical Sciences, Cambridge, United Kingdom.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. W. G. Chambers and D. Gollmann, “Lock-in effect in cascades of clock-controlled shift registers,” Advances in Cryptology — EUROCRYPT '88, Lecture Notes in Computer Science, vol. 330, C. G. Günther ed., Springer-Verlag, pp. 331–342, 1988.

    Google Scholar 

  2. W. Geiselmann and D. Gollmann, “Correlation attacks on cascades of clock controlled shift registers,” Advances in Cryptology — ASIACRYPT '96, Lecture Notes in Computer Science, vol. 1163, K. Kim and T. Matsumoto eds., Springer-Verlag, pp. 346–359, 1996.

    Google Scholar 

  3. J. Dj. Golić, “Intrinsic statistical weakness of keystream generators,” Advances in Cryptology — ASIACRYPT '94, Lecture Notes in Computer Science, vol. 917, J. Pieprzyk and R. Safavi-Naini eds., Springer-Verlag, pp. 91–103, 1995.

    Google Scholar 

  4. D. Gollmann and W. G. Chambers, “A cryptanalysis of stepk,m-cascades,” Advances in Cryptology — EUROCRYPT '89, Lecture Notes in Computer Science, vol. 434, J.-J. Quisquater, J. Vandewalle eds., Springer-Verlag, pp. 680–687, 1990.

    Google Scholar 

  5. S.-J. Lee, S.-J. Park, and S.-C. Goh, “On the security of the Gollmann cascades,” Advances in Cryptology — CRYPTO '95, Lecture Notes in Computer Science, vol. 963, D. Coppersmith ed., Springer-Verlag, pp. 148–157, 1995.

    Google Scholar 

  6. W. Meier and O. Staffelbach, “Fast correlation attacks on certain stream ciphers,” Journal of Cryptology, vol. 1(3), pp. 159–176, 1989.

    Article  MATH  MathSciNet  Google Scholar 

  7. W. Meier and O. Staffelbach, “Correlation properties of combiners with memory in stream ciphers,” Journal of Cryptology, vol. 5(1), pp. 67–86, 1992.

    Article  MATH  MathSciNet  Google Scholar 

  8. R. Menicocci, “Cryptanalysis of a two-stage Gollmann cascade generator,” in Proceedings of SPRC '93, Rome, Italy, pp. 62–69, 1993.

    Google Scholar 

  9. R. Menicocci, “Short Gollmann cascade generators may be insecure,” CODES AND CYPHERS, Cryptography and Coding IV, P. G. Farrell ed., The Institute of Mathematics and its Applications, pp. 281–297, 1995.

    Google Scholar 

  10. R. Menicocci, “Up/down m-sequence cascades,” in Actas de la III Reunión Española de Criptología, Barcelona, Spain, pp. 33–38, 1994.

    Google Scholar 

  11. R. Menicocci, “A systematic attack on clock controlled cascades,” Advances in Cryptology — EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, A. De Santis ed., Springer-Verlag, pp. 450–455, 1995.

    Google Scholar 

  12. M. J. Mihaljević and J. Dj. Golić, “Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence,” Advances in Cryptology — EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 124–137, 1993.

    Google Scholar 

  13. T. Siegenthaler, “Decrypting a class of stream ciphers using ciphertext only,” IEEE Trans. Comput., vol. C-34, pp. 81–85, Jan. 1985.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Colin Boyd Ed Dawson

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Golić, J.D., Menicocci, R. (1998). Correlation attacks on up/down cascades. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053727

Download citation

  • DOI: https://doi.org/10.1007/BFb0053727

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64732-4

  • Online ISBN: 978-3-540-69101-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics