Meny

Javascript verkar inte påslaget? - Vissa delar av Lunds universitets webbplats fungerar inte optimalt utan javascript, kontrollera din webbläsares inställningar.
Du är här

Three Ways to Mount Distinguishing Attacks on Irregularly Clocked Stream Ciphers

Författare:
Publiceringsår: 2006
Språk: Engelska
Sidor: 95-102
Publikation/Tidskrift/Serie: International Journal of Security and Networks
Volym: 1
Nummer: 1/2
Dokumenttyp: Artikel i tidskrift
Förlag: Inderscience

Sammanfattning

Many stream ciphers use irregular clocking to introduce nonlinearity

to the keystream. We present three distinguishers on irregularly

clocked linear feedback shift registers.

The general idea used is to find suitable linear combinations of

keystream bits, here called samples, that are drawn from a

biased distribution. We describe how to place windows around the

estimated positions around members of the linear combinations, and very

efficiently create many samples with low computational complexity.

We also describe ideas based on constructing samples consisting of

vectors of bits (words) instead of single binary samples.

These vectors based methods can distinguish the cipher using fewer

keystream bits but sometimes require a higher computational complexity.

Nyckelord

  • Electrical Engineering, Electronic Engineering, Information Engineering
  • distinguishing attack
  • irregularly clocked LFSR

Övriga

Published
  • Informations- och kommunikationsteori-lup-obsolete

Box 117, 221 00 LUND
Telefon 046-222 00 00 (växel)
Telefax 046-222 47 20
lu [at] lu.se

Fakturaadress: Box 188, 221 00 LUND
Organisationsnummer: 202100-3211
Om webbplatsen