Edit Probability Correlation Attacks on Stop/ Go Clocked Keystream Generators

被引:0
|
作者
机构
[1] Rome CryptoDesign Center,
[2] Gemplus,undefined
[3] Via Pio Emanuelli 1,undefined
[4] 00143 Rome,undefined
[5] Italy jovan.golic@gemplus.com,undefined
[6] renato.menicocci@gemplus.com,undefined
来源
Journal of Cryptology | 2003年 / 16卷
关键词
Key words. Stream ciphers, Stop/go clocked shift registers, Edit probability, Correlation attack;
D O I
暂无
中图分类号
学科分类号
摘要
Abstract. Divide-and-conquer correlation attacks on the alternating step generator, the bilateral stop/ go generator, and the alleged A5 generator are proposed. They are based on appropriately defined edit probabilities incorporating the stop/ go clocking in these generators. Recursive algorithms for the efficient computation of the edit probabilities are derived. It is shown how the edit probabilities can be used to mount statistically optimal correlation attacks on the corresponding subsets of stop/ go clocked shift registers. By using a statistical hypothesis testing method for estimating the underlying false alarm probability, it is argued that the minimum output sequence length required to be known for a successful attack is linear in the total length of the targeted shift registers. This is illustrated by experimental attacks on the alternating step generator and the bilateral stop/ go generator composed of relatively short shift registers.
引用
收藏
页码:41 / 68
页数:27
相关论文
共 22 条
  • [1] Edit probability correlation attacks on stop/go clocked keystream generators
    Golic, JD
    Menicocci, R
    JOURNAL OF CRYPTOLOGY, 2003, 16 (01) : 41 - 68
  • [2] Edit probability correlation attack on the bilateral stop/go generator
    Menicocci, R
    Golic, JD
    CRYPTOGRAPHY AND CODING, 1999, 1746 : 201 - 212
  • [3] An improved correlation attack against irregular clocked and filtered keystream generators
    Molland, H
    Helleseth, T
    ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 : 373 - 389
  • [4] Correlation attacks on clock-controlled shift registers in keystream generators
    Golic, JD
    Petrovic, SV
    IEEE TRANSACTIONS ON COMPUTERS, 1996, 45 (04) : 482 - 486
  • [5] Improved linear consistency attack on irregular clocked keystream generators
    Molland, H
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 109 - 126
  • [6] Improved linear consistency attack on irregular clocked keystream generators
    Molland, Håvard
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3017 : 109 - 126
  • [7] Algebraic Attacks on Grain-Like Keystream Generators
    Beighton, Matthew
    Bartlett, Harry
    Simpson, Leonie
    Wong, Kenneth Koon-Ho
    INFORMATION SECURITY AND CRYPTOLOGY, ICISC 2021, 2022, 13218 : 241 - 270
  • [8] Correlation attacks on up/down and stop/go cascades
    Menicocci, R
    Golic, JD
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (02) : 486 - 498
  • [9] Two general attacks on pomaranch-like keystream generators
    Englund, Hakan
    Hell, Martin
    Johansson, Thomas
    FAST SOFTWARE ENCRYPTION, 2007, 4593 : 274 - +
  • [10] Reducing the space complexity of BDD-based attacks on keystream generators
    Krause, Matthias
    Stegemann, Dirk
    FAST SOFTWARE ENCRYPTION, 2006, 4047 : 163 - 178