Abstract
Summation generator was analyzed by Dawson’s divide-and-conquer- attack[1] and showed us the weakness by Golic’s correlation attack[3] and Meier’s Fast correlation attack[4]. In this paper, We propose a Circular-Clock-Controlled Summation Generator(CCC-SG), an enhanced E0 algorithm for GSM system, and analyze the security aspects and the performances.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Dawson, E.: Cryptanalysis of Summation generator. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 209–215. Springer, Heidelberg (1993)
Rueppel, R.: Correlation Immunity and the Summation Generator. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 260–272. Springer, Heidelberg (1986)
Golic, J., Salmasizadeh, M., Dawson, E.: Fast Correlation Attacks on the summation Generator. Journal of cryptology 13(2), 245–262 (2000)
Meier, W., Staffelbach, O.: Correlation Properties of combiners with Memory in Stream Ciphers. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 204–213. Springer, Heidelberg (1991)
Specification on the Bluetooth System, version 1.1 February 22 (2001)
Massey, J.: Shift-Register Synthesis and BCH Decoding. IEEE Transactions on Information Theory IT15(1), 122–127 (1969)
Jonsson, F., Johansson, T.: A fast correlation attack on LILI-128. Information Processing Letters 80(3), 122–127 (2003)
Babbage, S.: Improved exhaustive search attacks on stream cipher. In: European Convention on Security and Detection, IEEE Conference Publication, vol. 408, pp. 161–166 (1995)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, H., Lee, H., Moon, S. (2008). A Security Enhancement of the E0 Cipher in Bluetooth System. In: Nguyen, N.T., Jo, G.S., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2008. Lecture Notes in Computer Science(), vol 4953. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78582-8_87
Download citation
DOI: https://doi.org/10.1007/978-3-540-78582-8_87
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78581-1
Online ISBN: 978-3-540-78582-8
eBook Packages: Computer ScienceComputer Science (R0)