Three Ways to Mount Distinguishing Attacks on Irregularly Clocked Stream Ciphers
Författare
Summary, in English
Many stream ciphers use irregular clocking to introduce nonlinearity
to the keystream. We present three distinguishers on irregularly
clocked linear feedback shift registers.
The general idea used is to find suitable linear combinations of
keystream bits, here called samples, that are drawn from a
biased distribution. We describe how to place windows around the
estimated positions around members of the linear combinations, and very
efficiently create many samples with low computational complexity.
We also describe ideas based on constructing samples consisting of
vectors of bits (words) instead of single binary samples.
These vectors based methods can distinguish the cipher using fewer
keystream bits but sometimes require a higher computational complexity.
to the keystream. We present three distinguishers on irregularly
clocked linear feedback shift registers.
The general idea used is to find suitable linear combinations of
keystream bits, here called samples, that are drawn from a
biased distribution. We describe how to place windows around the
estimated positions around members of the linear combinations, and very
efficiently create many samples with low computational complexity.
We also describe ideas based on constructing samples consisting of
vectors of bits (words) instead of single binary samples.
These vectors based methods can distinguish the cipher using fewer
keystream bits but sometimes require a higher computational complexity.
Publiceringsår
2006
Språk
Engelska
Sidor
95-102
Publikation/Tidskrift/Serie
International Journal of Security and Networks
Volym
1
Issue
1/2
Dokumenttyp
Artikel i tidskrift
Förlag
Inderscience Publishers
Ämne
- Electrical Engineering, Electronic Engineering, Information Engineering
Nyckelord
- distinguishing attack
- irregularly clocked LFSR
Status
Published
Forskningsgrupp
- Informations- och kommunikationsteori