Webbläsaren som du använder stöds inte av denna webbplats. Alla versioner av Internet Explorer stöds inte längre, av oss eller Microsoft (läs mer här: * https://www.microsoft.com/en-us/microsoft-365/windows/end-of-ie-support).

Var god och använd en modern webbläsare för att ta del av denna webbplats, som t.ex. nyaste versioner av Edge, Chrome, Firefox eller Safari osv.

Three Ways to Mount Distinguishing Attacks on Irregularly Clocked Stream Ciphers

Författare

Summary, in English

Many stream ciphers use irregular clocking to introduce nonlinearity

to the keystream. We present three distinguishers on irregularly

clocked linear feedback shift registers.

The general idea used is to find suitable linear combinations of

keystream bits, here called samples, that are drawn from a

biased distribution. We describe how to place windows around the

estimated positions around members of the linear combinations, and very

efficiently create many samples with low computational complexity.

We also describe ideas based on constructing samples consisting of

vectors of bits (words) instead of single binary samples.

These vectors based methods can distinguish the cipher using fewer

keystream bits but sometimes require a higher computational complexity.

Publiceringsår

2006

Språk

Engelska

Sidor

95-102

Publikation/Tidskrift/Serie

International Journal of Security and Networks

Volym

1

Issue

1/2

Dokumenttyp

Artikel i tidskrift

Förlag

Inderscience Publishers

Ämne

  • Electrical Engineering, Electronic Engineering, Information Engineering

Nyckelord

  • distinguishing attack
  • irregularly clocked LFSR

Status

Published

Forskningsgrupp

  • Informations- och kommunikationsteori