A new distinguisher for clock controlled stream ciphers

被引:0
|
作者
Englund, H [1 ]
Johansson, T [1 ]
机构
[1] Lund Univ, Dept Informat Technol, S-22100 Lund, Sweden
来源
FAST SOFTWARE ENCRYPTION | 2005年 / 3557卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper we present a distinguisher targeting towards irregularly clocked filter generators. The attack is applied on the irregularly. clocked stream cipher called LILI-II. LILI-II is the successor of the cipher LILI-128 and its design was published in [1]. There have been no known attacks better than exhaustive key search on LILI-II. Our attack is-the first of this kind that distinguishes the cipher output from a random source using 2(103) bits of keystream using computational complexity of approximately 2(103) operations.
引用
收藏
页码:181 / 195
页数:15
相关论文
共 50 条
  • [1] Algebraic attacks on clock-controlled stream ciphers
    Al-Hinai, Sultan
    Batten, Lynn
    Colbert, Bernard
    Wong, Kenneth
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2006, 4058 : 1 - 16
  • [2] On effectiveness of clock control in stream ciphers
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    Sakurai, Kouichi
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (09) : 1780 - 1787
  • [3] Experimental analysis of guess-and-determine attacks on clock-controlled stream ciphers
    Kiyomoto, S
    Tanaka, T
    Sakurai, K
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2005, E88A (10) : 2778 - 2791
  • [4] Improvement of the edit distance attack to clock-controlled LFSR-based stream ciphers
    Caballero-Gil, P
    Fúster-Sabater, A
    [J]. COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2005, 2005, 3643 : 355 - 364
  • [5] Linearities in Cascade Jump Controlled Stream Ciphers
    Jansen, Cees J. A.
    [J]. ENHANCING CRYPTOGRAPHIC PRIMITIVES WITH TECHNIQUES FROM ERROR CORRECTING CODES, 2009, 23 : 179 - 191
  • [6] New correlation attacks on stream ciphers
    Penzhorn, WT
    Bruwer, C
    [J]. 2002 IEEE AFRICON, VOLS 1 AND 2: ELECTROTECHNOLOGICAL SERVICES FOR AFRICA, 2002, : 203 - 208
  • [7] Algebraic attacks on clock-controlled cascade ciphers
    Wong, Kenneth Koon-Ho
    Colbert, Bernard
    Batten, Lynn
    Al-Hinai, Sultan
    [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 32 - +
  • [8] Security of jump controlled sequence generators for stream ciphers
    Helleseth, Tor
    Jansen, Cees J. A.
    Khazaei, Shahram
    Kholosha, Alexander
    [J]. SEQUENCES AND THEIR APPLICATIONS - SETA 2006, 2006, 4086 : 141 - 152
  • [9] STREAM CIPHERS
    PIPER, F
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1983, 149 : 181 - 188
  • [10] New Cryptanalysis of Irregularly Decimated Stream Ciphers
    Zhang, Bin
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 449 - 465