Skip to main content

A faster cryptanalysis of the self-shrinking generator

  • Session 5: Stream Ciphers
  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1172))

Included in the following conference series:

Abstract

A novel algorithm for cryptanalysis of the self-shrinking generator is presented and discussed, assuming that number of the shift register feedback taps is large and that length of the available generator output sequence is under a certain limit. It is baseo on a probabilistic approach and employes the generator output sequence not only for the hypothesis testing, but also for reducing the set of hypothesis which have to be tested. When the shift register length is L and the characteristic polynomial is known, the novel algorithm ensures the cryptanalysis with overall compexity 2L−l, l ≤ L/2, assuming that required length of the generator output sequence is not greater than \(\ell 2^{L/2} \left( {\mathop {L/2}\limits_\ell } \right)^{ - 1}\). The proposed algorithm yields significant average gain of 2l−0.25L in comparison with the best one published so far, which can work under the assumed conditions.

This research was supported by the Science Fund, Grant No. 04M02.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R.A. Rueppel, ”Stream ciphers” in G. Simmons, editor, Contemporary cryptology, The Science of Information Protection. IEEE Press, New York, 1992, pp. 65–134.

    Google Scholar 

  2. D. Coppersmith, H. Krawczyk, and Y. Mansour, ”The shrinking generator”, Advances in Cryptology — CRYPTO '93, Lecture Notes in Computer Science, vol. 773, pp. 22–39, 1994.

    Google Scholar 

  3. W. Meier and O. Staffelbach, ”The self-shrinking generator”, Advances in Cryptology — EUROCRYPT '94, Lecture Notes in Computer Sciences, vol. 950, pp. 205–214, 1995.

    Google Scholar 

  4. M.J. Mihaljević, ”An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure”, Advances in Cryptology — AUSCRYPT '92, Lecture Notes in Computer Science, vol. 718, pp. 349–356, 1993.

    Google Scholar 

  5. J.Dj. Golić and L. O'Connor, ”Embeding and probabilistic correlation attacks on clock-controlled shift registers”, Advances in Cryptology — EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, pp. 230–243, 1995.

    Google Scholar 

  6. J.Dj. Golić, ”Towards fast correlation attacks on irregularly clocked shift registers”, Advances in Cryptology — EUROCRYPT '95, Lecture Notes in Computer Science, vol. 921, pp. 248–261, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Miodrag J. Mihaljević .

Editor information

Josef Pieprzyk Jennifer Seberry

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Mihaljević, M.J. (1996). A faster cryptanalysis of the self-shrinking generator. In: Pieprzyk, J., Seberry, J. (eds) Information Security and Privacy. ACISP 1996. Lecture Notes in Computer Science, vol 1172. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0023298

Download citation

  • DOI: https://doi.org/10.1007/BFb0023298

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61991-8

  • Online ISBN: 978-3-540-49583-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics