Improvement of the edit distance attack to clock-controlled LFSR-based stream ciphers

被引:0
|
作者
Caballero-Gil, P [1 ]
Fúster-Sabater, A
机构
[1] Univ La Laguna, DEIOC, San Cristobal la Laguna 38271, Tenerife, Spain
[2] CSIC, Inst Appl Phys, E-28006 Madrid, Spain
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The main idea behind this paper is to improve a known plain-text divide-and-conquer attack that consists in guessing the initial state of a Linear Feedback Shift Register component of a keystream generator, and then trying to determine the other variables of the cipher based on the intercepted keystream. While the original attack requires the exhaustive search over the set of all possible initial states of the involved register, this work presents a new and simple heuristic optimization of such an approach that avoids the evaluation of an important number of initial states when launching a constrained edit distance attack on irregularly clocked shift registers.
引用
收藏
页码:355 / 364
页数:10
相关论文
共 47 条
  • [21] An improved attack on clock-controlled shift registers based on hardware implementation
    Lei Li
    XiangHui Liu
    Zheng Wang
    FengHua Li
    Science China Information Sciences, 2013, 56 : 1 - 10
  • [22] An improved attack on clock-controlled shift registers based on hardware implementation
    LI Lei
    LIU XiangHui
    WANG Zheng
    LI FengHua
    Science China(Information Sciences), 2013, 56 (11) : 228 - 237
  • [23] Edit distances and probabilities for correlation attacks on clock-controlled combiners with memory
    Golic, JD
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2001, 47 (03) : 1032 - 1041
  • [24] Vulnerability of multibit clock-controlled cascades to inversion attack
    Golic, JD
    ELECTRONICS LETTERS, 2000, 36 (18) : 1536 - 1538
  • [25] A note on the improvement of a fast correlation attack on stream ciphers
    Hosobuchi, Satoshi
    Saito, Tomohiko
    Matsushima, Toshiyasu
    ELECTRONICS AND COMMUNICATIONS IN JAPAN PART III-FUNDAMENTAL ELECTRONIC SCIENCE, 2007, 90 (04): : 9 - 17
  • [26] An efficient seeds selection method for LFSR-based test-per-clock BIST
    Kalligeros, E
    Kavousianos, X
    Bakalis, D
    Nikolos, D
    PROCEEDING OF THE 2002 3RD INTERNATIONAL SYMPOSIUM ON QUALITY ELECTRONIC DESIGN, 2002, : 261 - 266
  • [27] Algebraic Attack on the More Generalized Clock-Controlled Alternating Step Generator
    Hassanzadeh, Mehdi M.
    Helleseth, Tor
    2010 INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS (SPCOM), 2010,
  • [28] Cryptanalytic attack on cryptographic sequence generators:: The class of clock-controlled shrinking generators
    Fuster-Sabater, A.
    Caballero-Gil, P.
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 2, PROCEEDINGS, 2008, 5073 : 668 - +
  • [29] Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions
    Deepthi, P. P.
    Sathidevi, P. S.
    COMPUTERS & SECURITY, 2009, 28 (3-4) : 229 - 241
  • [30] Image Digital Watermarking Based on a Novel Clock-controlled Generator
    Bai, Enjian
    Yang, Yiyu
    Jiang, Xueqin
    2017 4TH INTERNATIONAL CONFERENCE ON SYSTEMS AND INFORMATICS (ICSAI), 2017, : 1224 - 1228