Abstract
The LILI-II keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. LILI-II is a specific cipher from the LILI family of keystream generators, and was designed with larger internal components than previous ciphers in this class, in order to provide increased security. The design offers large period and linear complexity, is immune to currently known styles of attack, and is simple to implement in hardware or software. The cipher achieves a security level of 128 bits.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
R. Anderson. Searching for the Optimum Correlation Attack. In Fast Software Encryption-Leuven’94, volume 1008 of Lecture Notes in Computer Science, pages 137–143. Springer-Verlag, 1995.
S. Babbage. A space/time tradeoff in exhaustive search attacks on stream ciphers. European Convention on Security and Detection, IEE Conference Publication No. 408, May 1995.
S. Babbage. Cryptanalysis of LILI-128. Available at https://cosic.esat.kuleuven.ac.be/nessie/reports/extwp3-001-2.pdf
A. Biryukov and A. Shamir. Cryptanalytic time/memory/data tradeoffs for stream ciphers. In Advances in Cryptology-ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 1–13. Springer-Verlag, 2000.
W.G. Chambers and D. Gollmann. Embedding attacks on step[1..D] clock-controlled generators. Electronics Letters, vol. 36 pp. 1771–1773, 2000.
E. Dawson, A. Clark, J. Golić, W. Millan, L. Penna and L. Simpson. The LILI-128 Keystream Generator. Available at https://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions.html .
C. Ding, G. Xiao and W. Shan. The Stability Theory of Stream Ciphers. Volume 561 of Lecture Notes in Computer Science. Springer-Verlag, 1991.
J. Dj. Golić and M. J. Mihaljević. A Generalised Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. Journal of Cryptology, vol. 3(3), pp. 201–212, 1991.
J. Dj. Golić and S. Petrović. A Generalised Correlation Attack with a Probabilistic Constrained Edit Distance. In Advances in Cryptology-EUROCRYPT’92, volume 658 of Lecture Notes in Computer Science, pages 472–476. Springer-Verlag, 1992.
J. Dj. Golić and L. O’Connor. Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. In Advances in Cryptology-EUROCRYPT’94, volume 950 of Lecture Notes in Computer Science, pages 230–243. Springer-Verlag, 1994.
J. Dj. Golić. On the Security of Nonlinear Filter Generators. In Fast Software Encryption-Cambridge’96, volume 1039 of Lecture Notes in Computer Science, pages 173–188. Springer-Verlag, 1996.
J. Dj. Golić. Cryptanalysis of Alleged A5 stream cipher. In Advances in Cryptology-EUROCRYPT’97, volume 1233 of Lecture Notes in Computer Science, pages 239–255. Springer-Verlag, 1997.
F. Jönsson and T. Johansson A Fast Correlation Attack on LILI-128. http://www.it.lth.se/thomas/papers/paper140.ps
H-J. Lee and S-J. Moon Parallel Stream Cipher for Secure High-Speed Communications. Signal Processing, vol. 82, no. 2, pp. 137–143, 2002.
J. Massey. Shift-Register Synthesis and BCH Decoding. IEEE Trans. Inform. Theory, IT-15:122–127, January 1969.
W. Meier and O. Staffelbach. Fast Correlation Attacks on Certain Stream Ciphers. Journal of Cryptology, vol. 1(3), pp. 159–167, 1989.
R. Rueppel. Analysis and design of stream ciphers. Springer-Verlag, Berlin, 1986.
M. Salmasizadeh, L. Simpson, J. Dj. Golić and E. Dawson. Fast Correlation Attacks and Multiple Linear Approximations. In Information Security and Privacy-Nepean’ 97, volume 1270 of Lecture Notes in Computer Science, pages 228–239. Springer-Verlag, 1997.
T. Siegenthaler. Decrypting a Class of Stream Ciphers Using Ciphertext Only. IEEE Trans. Computers, vol. C-34(1), pp. 81–85, 1985.
L. Simpson, J. Dj. Golić and E. Dawson. A Probabilistic Correlation Attack on the Shrinking Generator. In Information Security and Privacy-Brisbane’ 98, volume 1438 of Lecture Notes in Computer Science, pages 147–158. Springer-Verlag, 1998.
L. Simpson, E. Dawson, J. Dj. Golić and W. Millan. LILI Keystream Generator. Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptology-SAC’2000, volume 2012 of Lecture Notes in Computer Science, pages 248–261, Springer-Verlag, 2000.
K. C. Zeng, C. H. Yang and T. R. N. Rao. On the Linear Consistency Test (LCT) in Cryptanalysis with Applications. In Advances in Cryptology-CRYPTO’89, volume 434 of Lecture Notes in Computer Science, pages 164–174. Springer-Verlag, 1990.
M. Živković. An Algorithm for the Initial State Reconstruction of the Clock-Controlled Shift Register. IEEE Trans. Inform. Theory, vol. IT-37, pp. 1488–1490, Sept. 1991.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Clark, A. et al. (2002). The LILI-II Keystream Generator. In: Batten, L., Seberry, J. (eds) Information Security and Privacy. ACISP 2002. Lecture Notes in Computer Science, vol 2384. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45450-0_3
Download citation
DOI: https://doi.org/10.1007/3-540-45450-0_3
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43861-8
Online ISBN: 978-3-540-45450-2
eBook Packages: Springer Book Archive