Abstract
Conditional and unconditional correlation weaknesses of cascades of up/down clocked shift registers are determined. The corresponding systematic correlation attacks are proposed and the conditions for their success are obtained.
This work was done while the first author was with the Information Security Research Centre, Queensland University of Technology, Brisbane, Australia. Part of this work was carried out while the first author was on leave at the Isaac Newton Institute for Mathematical Sciences, Cambridge, United Kingdom.
Preview
Unable to display preview. Download preview PDF.
References
W. G. Chambers and D. Gollmann, “Lock-in effect in cascades of clock-controlled shift registers,” Advances in Cryptology — EUROCRYPT '88, Lecture Notes in Computer Science, vol. 330, C. G. Günther ed., Springer-Verlag, pp. 331–342, 1988.
W. Geiselmann and D. Gollmann, “Correlation attacks on cascades of clock controlled shift registers,” Advances in Cryptology — ASIACRYPT '96, Lecture Notes in Computer Science, vol. 1163, K. Kim and T. Matsumoto eds., Springer-Verlag, pp. 346–359, 1996.
J. Dj. Golić, “Intrinsic statistical weakness of keystream generators,” Advances in Cryptology — ASIACRYPT '94, Lecture Notes in Computer Science, vol. 917, J. Pieprzyk and R. Safavi-Naini eds., Springer-Verlag, pp. 91–103, 1995.
D. Gollmann and W. G. Chambers, “A cryptanalysis of stepk,m-cascades,” Advances in Cryptology — EUROCRYPT '89, Lecture Notes in Computer Science, vol. 434, J.-J. Quisquater, J. Vandewalle eds., Springer-Verlag, pp. 680–687, 1990.
S.-J. Lee, S.-J. Park, and S.-C. Goh, “On the security of the Gollmann cascades,” Advances in Cryptology — CRYPTO '95, Lecture Notes in Computer Science, vol. 963, D. Coppersmith ed., Springer-Verlag, pp. 148–157, 1995.
W. Meier and O. Staffelbach, “Fast correlation attacks on certain stream ciphers,” Journal of Cryptology, vol. 1(3), pp. 159–176, 1989.
W. Meier and O. Staffelbach, “Correlation properties of combiners with memory in stream ciphers,” Journal of Cryptology, vol. 5(1), pp. 67–86, 1992.
R. Menicocci, “Cryptanalysis of a two-stage Gollmann cascade generator,” in Proceedings of SPRC '93, Rome, Italy, pp. 62–69, 1993.
R. Menicocci, “Short Gollmann cascade generators may be insecure,” CODES AND CYPHERS, Cryptography and Coding IV, P. G. Farrell ed., The Institute of Mathematics and its Applications, pp. 281–297, 1995.
R. Menicocci, “Up/down m-sequence cascades,” in Actas de la III Reunión Española de Criptología, Barcelona, Spain, pp. 33–38, 1994.
R. Menicocci, “A systematic attack on clock controlled cascades,” Advances in Cryptology — EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, A. De Santis ed., Springer-Verlag, pp. 450–455, 1995.
M. J. Mihaljević and J. Dj. Golić, “Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence,” Advances in Cryptology — EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 124–137, 1993.
T. Siegenthaler, “Decrypting a class of stream ciphers using ciphertext only,” IEEE Trans. Comput., vol. C-34, pp. 81–85, Jan. 1985.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Golić, J.D., Menicocci, R. (1998). Correlation attacks on up/down cascades. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053727
Download citation
DOI: https://doi.org/10.1007/BFb0053727
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64732-4
Online ISBN: 978-3-540-69101-3
eBook Packages: Springer Book Archive