Related Concepts
Definition
The linear consistency attack is a divide-and-conquer technique which provides a known plaintext attack on stream ciphers. It was introduced by Zeng, Yang, and Rao in 1989. It has been applied to various keystream generators, like the Jenning generator [2], the stop-and-go generator [2], and the E0 cipher used in Bluetooth [1].
Theory
The linear consistency attack applies as soon as it is possible to single out a portion K 1 of the secret key and to form a system Ax = b of linear equations, where the matrix A only depends on K 1 and the right-side vector b is determined by the known keystream bits. Then, an exhaustive search for K 1 can be performed. The correct value of K 1 can be distinguished from a wrong one by checking whether the linear system is consistent or not. Once K 1 has been recovered, the solution x of the system may provide some additional bits of the secret key.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsRecommended Reading
Fluhrer SR, Lucks S (2001) Analysis of the E0 encryption system. In: Selected areas in cryptography – SAC 2001, Lecture notes in computer science, vol 2259. Springer, Berlin, pp 38–48
Zeng K, Yang CH, Rao TRN (1989) On the linear consistency test (LCT) in cryptanalysis with applications. In: Advances in cryptology – CRYPTO’89. Lecture notes in computer science, vol 435. Springer, Berlin, pp 164–174
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer Science+Business Media, LLC
About this entry
Cite this entry
Canteaut, A. (2011). Linear Consistency Attack. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_355
Download citation
DOI: https://doi.org/10.1007/978-1-4419-5906-5_355
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4419-5905-8
Online ISBN: 978-1-4419-5906-5
eBook Packages: Computer ScienceReference Module Computer Science and Engineering