Meny

Javascript verkar inte påslaget? - Vissa delar av Lunds universitets webbplats fungerar inte optimalt utan javascript, kontrollera din webbläsares inställningar.
Du är här

Three Ways to Mount Distinguishing Attacks on Irregularly Clocked Stream Ciphers

Författare:
Publiceringsår: 2006
Språk: Engelska
Sidor: 95-102
Publikation/Tidskrift/Serie: International Journal of Security and Networks
Volym: 1
Nummer: 1/2
Dokumenttyp: Artikel
Förlag: Inderscience Enterprise Ltd

Sammanfattning

Many stream ciphers use irregular clocking to introduce nonlinearity
to the keystream. We present three distinguishers on irregularly
clocked linear feedback shift registers.
The general idea used is to find suitable linear combinations of
keystream bits, here called samples, that are drawn from a
biased distribution. We describe how to place windows around the
estimated positions around members of the linear combinations, and very
efficiently create many samples with low computational complexity.
We also describe ideas based on constructing samples consisting of
vectors of bits (words) instead of single binary samples.
These vectors based methods can distinguish the cipher using fewer
keystream bits but sometimes require a higher computational complexity.

Disputation

Nyckelord

  • Technology and Engineering
  • distinguishing attack
  • irregularly clocked LFSR

Övriga

Published
Yes
  • Informations- och kommunikationsteori

Box 117, 221 00 LUND
Telefon 046-222 00 00 (växel)
Telefax 046-222 47 20
lu [at] lu [dot] se

Fakturaadress: Box 188, 221 00 LUND
Organisationsnummer: 202100-3211
Om webbplatsen