Advertisement

A probabilistic correlation attack on the shrinking generator

  • L. Simpson
  • J. Dj. Golić
  • E. Dawson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1438)

Abstract

A probabilistic correlation attack on irregularly clocked shift registers is applied in a divide and conquer attack on the shrinking generator. Systematic computer simulations show that the joint probability is a suitable basis for the correlation attack and that, given a keystream segment of length linear in the length of the clock-controlled shift register, the shift register initial states can be identified with high probability. The attack is conducted under the assumption that the secret key controls only the shift register initial states.

Key words

Cryptography Stream ciphers Correlation attacks Shrinking generator 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    D. Coppersmith, H. Krawczyk and Y. Mansour. The shrinking generator. Advances in Cryptology — CRYPTO '93, volume 773 of Lecture Notes in Computer Science, pages 22–39. Springer-Verlag, 1993.Google Scholar
  2. 2.
    J. Dj. Golić and M. J. Mihaljević. A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance. Journal of Cryptology, 3(3):201–212, 1991.MathSciNetGoogle Scholar
  3. 3.
    J. Dj. Golić and L. O'Connor. Embedding and probabilistic correlation attacks on clock-controlled shift registers. Advances in Cryptology — EUROCRYPT '94, volume 950 of Lecture Notes in Computer Science, pages 230–243. Springer-Verlag, 1994.Google Scholar
  4. 4.
    J. L. Massey. Shift-register synthesis and BCH decoding. IEEE Trans. Inform. Theory, IT-15:122–127, Jan. 1969.MathSciNetCrossRefGoogle Scholar
  5. 5.
    H. Schildt. C the Complete Reference. Osborne McGraw-Hill, Berkeley, CA, 1990.Google Scholar
  6. 6.
    K. C. Zeng, C. H. Yang,, and T. R. N. Rao. On the linear consistency test (LCT) in cryptanalysis and its applications. Advances in Cryptology — CRYPTO '89, volume 434 of Lecture Notes in Computer Science, pages 164–174. Springer-Verlag, 1990.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • L. Simpson
    • 1
  • J. Dj. Golić
    • 2
  • E. Dawson
    • 1
  1. 1.Information Security Research CentreQueensland University of TechnologyBrisbane QAustralia
  2. 2.School of Electrical EngineeringUniversity of BelgradeBelgradeYugoslavia

Personalised recommendations