Predicting the shrinking generator with fixed connections
Publikation/Tidskrift/Serie: Advances in Cryptology / Lecture Notes in Computer Science
Förlag: Springer Berlin / Heidelberg
We propose a novel distinguishing attack on the shrinking generator with known feedback polynomial for the generating LFSR. The attack can e.g. reliably distinguish a shrinking generator with a weight 4 polynomial of degree as large as 10000, using 2(32) output bits. As the feedback polynomial of an arbitrary LFSR is known to have a polynomial multiple of low weight, our distinguisher applies to arbitrary shrunken LFSR's of moderate length. The analysis can also be used to predict the distribution of blocks in the generated keystream.
- Technology and Engineering
EUROCRYPT 2003: International Conference on the Theory and Applications of Cryptographic Techniques
- ISSN: 0302-9743