A new distinguisher for clock controlled stream ciphers

被引:0
|
作者
Englund, H [1 ]
Johansson, T [1 ]
机构
[1] Lund Univ, Dept Informat Technol, S-22100 Lund, Sweden
来源
FAST SOFTWARE ENCRYPTION | 2005年 / 3557卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper we present a distinguisher targeting towards irregularly clocked filter generators. The attack is applied on the irregularly. clocked stream cipher called LILI-II. LILI-II is the successor of the cipher LILI-128 and its design was published in [1]. There have been no known attacks better than exhaustive key search on LILI-II. Our attack is-the first of this kind that distinguishes the cipher output from a random source using 2(103) bits of keystream using computational complexity of approximately 2(103) operations.
引用
收藏
页码:181 / 195
页数:15
相关论文
共 50 条
  • [31] Correlation attacks on stream ciphers
    Penzhorn, WT
    [J]. AFRICON '96 - 1996 IEEE AFRICON : 4TH AFRICON CONFERENCE IN AFRICA, VOLS I & II: ELECTRICAL ENERGY TECHNOLOGY; COMMUNICATION SYSTEMS; HUMAN RESOURCES, 1996, : 1093 - 1098
  • [32] The Research of Modern Stream Ciphers
    Gorbenko, Ivan
    Kuznetsov, Alexandr
    Lutsenko, Maria
    Ivanenko, Dmytro
    [J]. 2017 4TH INTERNATIONAL SCIENTIFIC-PRACTICAL CONFERENCE PROBLEMS OF INFOCOMMUNICATIONS-SCIENCE AND TECHNOLOGY (PIC S&T), 2017, : 207 - 210
  • [33] Stream ciphers for GSM networks
    Lo, CC
    Chen, YJ
    [J]. ICC 2000: IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CONFERENCE RECORD, VOLS 1-3: GLOBAL CONVERGENCE THROUGH COMMUNICATIONS, 2000, : 80 - 84
  • [34] Stream Ciphers and the eSTREAM Project
    Rijmen, Vincent
    [J]. ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2010, 2 (01): : 3 - 11
  • [35] Observability of permutations, and stream ciphers
    Byerly, RE
    Drager, LD
    Lee, JM
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (12) : 3326 - 3330
  • [36] Stream ciphers based on NLFSR
    Soriano, M
    [J]. ITS '98 PROCEEDINGS - SBT/IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 1998, : 528 - 533
  • [37] Stream ciphers: Dead or alive?
    Shamir, A
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 78 - 78
  • [38] THE STABILITY THEORY OF STREAM CIPHERS
    DING, C
    XIAO, G
    SHAN, W
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 561 : R3 - +
  • [39] Stream ciphers for GSM networks
    Lo, CC
    Chen, YJ
    [J]. COMPUTER COMMUNICATIONS, 2001, 24 (11) : 1090 - 1096
  • [40] Fault analysis of stream ciphers
    Hoch, JJ
    Shamir, A
    [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 240 - 253