Skip to main content

The LILI-II Keystream Generator

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2384))

Included in the following conference series:

Abstract

The LILI-II keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. LILI-II is a specific cipher from the LILI family of keystream generators, and was designed with larger internal components than previous ciphers in this class, in order to provide increased security. The design offers large period and linear complexity, is immune to currently known styles of attack, and is simple to implement in hardware or software. The cipher achieves a security level of 128 bits.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. Anderson. Searching for the Optimum Correlation Attack. In Fast Software Encryption-Leuven’94, volume 1008 of Lecture Notes in Computer Science, pages 137–143. Springer-Verlag, 1995.

    Google Scholar 

  2. S. Babbage. A space/time tradeoff in exhaustive search attacks on stream ciphers. European Convention on Security and Detection, IEE Conference Publication No. 408, May 1995.

    Google Scholar 

  3. S. Babbage. Cryptanalysis of LILI-128. Available at https://cosic.esat.kuleuven.ac.be/nessie/reports/extwp3-001-2.pdf

  4. A. Biryukov and A. Shamir. Cryptanalytic time/memory/data tradeoffs for stream ciphers. In Advances in Cryptology-ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 1–13. Springer-Verlag, 2000.

    Chapter  Google Scholar 

  5. W.G. Chambers and D. Gollmann. Embedding attacks on step[1..D] clock-controlled generators. Electronics Letters, vol. 36 pp. 1771–1773, 2000.

    Article  Google Scholar 

  6. E. Dawson, A. Clark, J. Golić, W. Millan, L. Penna and L. Simpson. The LILI-128 Keystream Generator. Available at https://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions.html .

  7. C. Ding, G. Xiao and W. Shan. The Stability Theory of Stream Ciphers. Volume 561 of Lecture Notes in Computer Science. Springer-Verlag, 1991.

    MATH  Google Scholar 

  8. J. Dj. Golić and M. J. Mihaljević. A Generalised Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. Journal of Cryptology, vol. 3(3), pp. 201–212, 1991.

    Article  MathSciNet  MATH  Google Scholar 

  9. J. Dj. Golić and S. Petrović. A Generalised Correlation Attack with a Probabilistic Constrained Edit Distance. In Advances in Cryptology-EUROCRYPT’92, volume 658 of Lecture Notes in Computer Science, pages 472–476. Springer-Verlag, 1992.

    Google Scholar 

  10. J. Dj. Golić and L. O’Connor. Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. In Advances in Cryptology-EUROCRYPT’94, volume 950 of Lecture Notes in Computer Science, pages 230–243. Springer-Verlag, 1994.

    Chapter  Google Scholar 

  11. J. Dj. Golić. On the Security of Nonlinear Filter Generators. In Fast Software Encryption-Cambridge’96, volume 1039 of Lecture Notes in Computer Science, pages 173–188. Springer-Verlag, 1996.

    Google Scholar 

  12. J. Dj. Golić. Cryptanalysis of Alleged A5 stream cipher. In Advances in Cryptology-EUROCRYPT’97, volume 1233 of Lecture Notes in Computer Science, pages 239–255. Springer-Verlag, 1997.

    Google Scholar 

  13. F. Jönsson and T. Johansson A Fast Correlation Attack on LILI-128. http://www.it.lth.se/thomas/papers/paper140.ps

  14. H-J. Lee and S-J. Moon Parallel Stream Cipher for Secure High-Speed Communications. Signal Processing, vol. 82, no. 2, pp. 137–143, 2002.

    Article  Google Scholar 

  15. J. Massey. Shift-Register Synthesis and BCH Decoding. IEEE Trans. Inform. Theory, IT-15:122–127, January 1969.

    Google Scholar 

  16. W. Meier and O. Staffelbach. Fast Correlation Attacks on Certain Stream Ciphers. Journal of Cryptology, vol. 1(3), pp. 159–167, 1989.

    Article  MATH  MathSciNet  Google Scholar 

  17. R. Rueppel. Analysis and design of stream ciphers. Springer-Verlag, Berlin, 1986.

    MATH  Google Scholar 

  18. M. Salmasizadeh, L. Simpson, J. Dj. Golić and E. Dawson. Fast Correlation Attacks and Multiple Linear Approximations. In Information Security and Privacy-Nepean’ 97, volume 1270 of Lecture Notes in Computer Science, pages 228–239. Springer-Verlag, 1997.

    Chapter  Google Scholar 

  19. T. Siegenthaler. Decrypting a Class of Stream Ciphers Using Ciphertext Only. IEEE Trans. Computers, vol. C-34(1), pp. 81–85, 1985.

    Article  Google Scholar 

  20. L. Simpson, J. Dj. Golić and E. Dawson. A Probabilistic Correlation Attack on the Shrinking Generator. In Information Security and Privacy-Brisbane’ 98, volume 1438 of Lecture Notes in Computer Science, pages 147–158. Springer-Verlag, 1998.

    Chapter  Google Scholar 

  21. L. Simpson, E. Dawson, J. Dj. Golić and W. Millan. LILI Keystream Generator. Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptology-SAC’2000, volume 2012 of Lecture Notes in Computer Science, pages 248–261, Springer-Verlag, 2000.

    Google Scholar 

  22. K. C. Zeng, C. H. Yang and T. R. N. Rao. On the Linear Consistency Test (LCT) in Cryptanalysis with Applications. In Advances in Cryptology-CRYPTO’89, volume 434 of Lecture Notes in Computer Science, pages 164–174. Springer-Verlag, 1990.

    Google Scholar 

  23. M. Živković. An Algorithm for the Initial State Reconstruction of the Clock-Controlled Shift Register. IEEE Trans. Inform. Theory, vol. IT-37, pp. 1488–1490, Sept. 1991.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Clark, A. et al. (2002). The LILI-II Keystream Generator. In: Batten, L., Seberry, J. (eds) Information Security and Privacy. ACISP 2002. Lecture Notes in Computer Science, vol 2384. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45450-0_3

Download citation

  • DOI: https://doi.org/10.1007/3-540-45450-0_3

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-43861-8

  • Online ISBN: 978-3-540-45450-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics