Javascript is not activated in your browser. This website needs javascript activated to work properly.
Du är här

Three Ways to Mount Distinguishing Attacks on Irregularly Clocked Stream Ciphers

Publiceringsår: 2006
Språk: Engelska
Sidor: 95-102
Publikation/Tidskrift/Serie: International Journal of Security and Networks
Volym: 1
Nummer: 1/2
Dokumenttyp: Artikel
Förlag: Inderscience Enterprise Ltd


Many stream ciphers use irregular clocking to introduce nonlinearity
to the keystream. We present three distinguishers on irregularly
clocked linear feedback shift registers.
The general idea used is to find suitable linear combinations of
keystream bits, here called samples, that are drawn from a
biased distribution. We describe how to place windows around the
estimated positions around members of the linear combinations, and very
efficiently create many samples with low computational complexity.
We also describe ideas based on constructing samples consisting of
vectors of bits (words) instead of single binary samples.
These vectors based methods can distinguish the cipher using fewer
keystream bits but sometimes require a higher computational complexity.



  • Technology and Engineering
  • distinguishing attack
  • irregularly clocked LFSR


  • Informations- och kommunikationsteori

Box 117, 221 00 LUND
Telefon 046-222 00 00 (växel)
Telefax 046-222 47 20
lu [at] lu [dot] se

Fakturaadress: Box 188, 221 00 LUND
Organisationsnummer: 202100-3211
Om webbplatsen