Improvement of the edit distance attack to clock-controlled LFSR-based stream ciphers

被引:0
|
作者
Caballero-Gil, P [1 ]
Fúster-Sabater, A
机构
[1] Univ La Laguna, DEIOC, San Cristobal la Laguna 38271, Tenerife, Spain
[2] CSIC, Inst Appl Phys, E-28006 Madrid, Spain
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The main idea behind this paper is to improve a known plain-text divide-and-conquer attack that consists in guessing the initial state of a Linear Feedback Shift Register component of a keystream generator, and then trying to determine the other variables of the cipher based on the intercepted keystream. While the original attack requires the exhaustive search over the set of all possible initial states of the involved register, this work presents a new and simple heuristic optimization of such an approach that avoids the evaluation of an important number of initial states when launching a constrained edit distance attack on irregularly clocked shift registers.
引用
收藏
页码:355 / 364
页数:10
相关论文
共 47 条
  • [31] Subsequence Matching Based on Edit Distance Over Data Stream
    Liang Guang-min
    NATIONAL CONFERENCE OF HIGHER VOCATIONAL AND TECHNICAL EDUCATION ON COMPUTER INFORMATION, 2010, : 304 - 310
  • [32] Graph-based improvement of edit distance attacks
    Caballero-Gil, P.
    Fuster-Sabater, A.
    COMPUTATIONAL METHODS IN SCIENCE AND ENGINEERING VOL 1: THEORY AND COMPUTATION: OLD PROBLEMS AND NEW CHALLENGES, 2007, 963 : 627 - +
  • [33] The rainbow attack on stream ciphers based on Maiorana-McFarland functions
    Khoo, Khoongming
    Gong, Guang
    Lee, Hian-Kiat
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2006, 3989 : 194 - 209
  • [34] Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists
    Zou, Min-Hui
    Ma, Kun
    Wu, Kai-Jie
    Sha, Edwin Hsing-Mean
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2014, 29 (04) : 646 - 655
  • [36] Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists
    邹敏辉
    马坤
    吴剀劼
    沙行勉
    Journal of Computer Science & Technology, 2014, 29 (04) : 646 - 655
  • [37] Scan-Based Attack on Stream Ciphers: A Case Study on eSTREAM Finalists
    Min-Hui Zou
    Kun Ma
    Kai-Jie Wu
    Edwin Hsing-Mean Sha
    Journal of Computer Science and Technology, 2014, 29 : 646 - 655
  • [38] Cryptanalysis of hardware based stream ciphers and implementation of GSM stream cipher to propose a novel approach for designing n-bit LFSR stream cipher
    Upadhyay, Darshana
    Shah, Trishla
    Sharma, Priyanka
    2015 19TH INTERNATIONAL SYMPOSIUM ON VLSI DESIGN AND TEST (VDAT), 2015,
  • [39] Scan-based side channel attack on stream ciphers and its prevention
    Sandip Karmakar
    Dipanwita Roy Chowdhury
    Journal of Cryptographic Engineering, 2018, 8 : 327 - 340
  • [40] Scan-based side channel attack on stream ciphers and its prevention
    Karmakar, Sandip
    Chowdhury, Dipanwita Roy
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2018, 8 (04) : 327 - 340