Skip to main content

Linear Consistency Attack

  • Reference work entry
  • 88 Accesses

Related Concepts

Linear Cryptanalysis for Stream Ciphers; Stream Cipher

Definition

The linear consistency attack is a divide-and-conquer technique which provides a known plaintext attack on stream ciphers. It was introduced by Zeng, Yang, and Rao in 1989. It has been applied to various keystream generators, like the Jenning generator [2], the stop-and-go generator [2], and the E0 cipher used in Bluetooth [1].

Theory

The linear consistency attack applies as soon as it is possible to single out a portion K 1 of the secret key and to form a system Ax = b of linear equations, where the matrix A only depends on K 1 and the right-side vector b is determined by the known keystream bits. Then, an exhaustive search for K 1 can be performed. The correct value of K 1 can be distinguished from a wrong one by checking whether the linear system is consistent or not. Once K 1 has been recovered, the solution x of the system may provide some additional bits of the secret key.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Recommended Reading

  1. Fluhrer SR, Lucks S (2001) Analysis of the E0 encryption system. In: Selected areas in cryptography – SAC 2001, Lecture notes in computer science, vol 2259. Springer, Berlin, pp 38–48

    Google Scholar 

  2. Zeng K, Yang CH, Rao TRN (1989) On the linear consistency test (LCT) in cryptanalysis with applications. In: Advances in cryptology – CRYPTO’89. Lecture notes in computer science, vol 435. Springer, Berlin, pp 164–174

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Canteaut, A. (2011). Linear Consistency Attack. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_355

Download citation

Publish with us

Policies and ethics