Advertisement

Correlation attacks on up/down cascades

  • Jovan Dj. Golić
  • Renato Menicocci
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1438)

Abstract

Conditional and unconditional correlation weaknesses of cascades of up/down clocked shift registers are determined. The corresponding systematic correlation attacks are proposed and the conditions for their success are obtained.

Keywords

Stream ciphers clock-controlled shift registers up/down and stop/go cascades cryptanalysis correlation attacks 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    W. G. Chambers and D. Gollmann, “Lock-in effect in cascades of clock-controlled shift registers,” Advances in Cryptology — EUROCRYPT '88, Lecture Notes in Computer Science, vol. 330, C. G. Günther ed., Springer-Verlag, pp. 331–342, 1988.Google Scholar
  2. 2.
    W. Geiselmann and D. Gollmann, “Correlation attacks on cascades of clock controlled shift registers,” Advances in Cryptology — ASIACRYPT '96, Lecture Notes in Computer Science, vol. 1163, K. Kim and T. Matsumoto eds., Springer-Verlag, pp. 346–359, 1996.Google Scholar
  3. 3.
    J. Dj. Golić, “Intrinsic statistical weakness of keystream generators,” Advances in Cryptology — ASIACRYPT '94, Lecture Notes in Computer Science, vol. 917, J. Pieprzyk and R. Safavi-Naini eds., Springer-Verlag, pp. 91–103, 1995.Google Scholar
  4. 4.
    D. Gollmann and W. G. Chambers, “A cryptanalysis of stepk,m-cascades,” Advances in Cryptology — EUROCRYPT '89, Lecture Notes in Computer Science, vol. 434, J.-J. Quisquater, J. Vandewalle eds., Springer-Verlag, pp. 680–687, 1990.Google Scholar
  5. 5.
    S.-J. Lee, S.-J. Park, and S.-C. Goh, “On the security of the Gollmann cascades,” Advances in Cryptology — CRYPTO '95, Lecture Notes in Computer Science, vol. 963, D. Coppersmith ed., Springer-Verlag, pp. 148–157, 1995.Google Scholar
  6. 6.
    W. Meier and O. Staffelbach, “Fast correlation attacks on certain stream ciphers,” Journal of Cryptology, vol. 1(3), pp. 159–176, 1989.MATHMathSciNetCrossRefGoogle Scholar
  7. 7.
    W. Meier and O. Staffelbach, “Correlation properties of combiners with memory in stream ciphers,” Journal of Cryptology, vol. 5(1), pp. 67–86, 1992.MATHMathSciNetCrossRefGoogle Scholar
  8. 8.
    R. Menicocci, “Cryptanalysis of a two-stage Gollmann cascade generator,” in Proceedings of SPRC '93, Rome, Italy, pp. 62–69, 1993.Google Scholar
  9. 9.
    R. Menicocci, “Short Gollmann cascade generators may be insecure,” CODES AND CYPHERS, Cryptography and Coding IV, P. G. Farrell ed., The Institute of Mathematics and its Applications, pp. 281–297, 1995.Google Scholar
  10. 10.
    R. Menicocci, “Up/down m-sequence cascades,” in Actas de la III Reunión Española de Criptología, Barcelona, Spain, pp. 33–38, 1994.Google Scholar
  11. 11.
    R. Menicocci, “A systematic attack on clock controlled cascades,” Advances in Cryptology — EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, A. De Santis ed., Springer-Verlag, pp. 450–455, 1995.Google Scholar
  12. 12.
    M. J. Mihaljević and J. Dj. Golić, “Convergence of a Bayesian iterative error-correction procedure on a noisy shift register sequence,” Advances in Cryptology — EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 124–137, 1993.Google Scholar
  13. 13.
    T. Siegenthaler, “Decrypting a class of stream ciphers using ciphertext only,” IEEE Trans. Comput., vol. C-34, pp. 81–85, Jan. 1985.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Jovan Dj. Golić
    • 1
  • Renato Menicocci
    • 2
  1. 1.School of Electrical EngineeringUniversity of BelgradeBeogradYugoslavia
  2. 2.Fondazione Ugo BordoniRomaItaly

Personalised recommendations