Skip to main content

A Security Enhancement of the E0 Cipher in Bluetooth System

  • Conference paper
Agent and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2008)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4953))

  • 1584 Accesses

Abstract

Summation generator was analyzed by Dawson’s divide-and-conquer- attack[1] and showed us the weakness by Golic’s correlation attack[3] and Meier’s Fast correlation attack[4]. In this paper, We propose a Circular-Clock-Controlled Summation Generator(CCC-SG), an enhanced E0 algorithm for GSM system, and analyze the security aspects and the performances.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Dawson, E.: Cryptanalysis of Summation generator. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 209–215. Springer, Heidelberg (1993)

    Google Scholar 

  2. Rueppel, R.: Correlation Immunity and the Summation Generator. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 260–272. Springer, Heidelberg (1986)

    Google Scholar 

  3. Golic, J., Salmasizadeh, M., Dawson, E.: Fast Correlation Attacks on the summation Generator. Journal of cryptology 13(2), 245–262 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  4. Meier, W., Staffelbach, O.: Correlation Properties of combiners with Memory in Stream Ciphers. In: Damgård, I.B. (ed.) EUROCRYPT 1990. LNCS, vol. 473, pp. 204–213. Springer, Heidelberg (1991)

    Chapter  Google Scholar 

  5. Specification on the Bluetooth System, version 1.1 February 22 (2001)

    Google Scholar 

  6. Massey, J.: Shift-Register Synthesis and BCH Decoding. IEEE Transactions on Information Theory IT15(1), 122–127 (1969)

    Article  MathSciNet  Google Scholar 

  7. Jonsson, F., Johansson, T.: A fast correlation attack on LILI-128. Information Processing Letters 80(3), 122–127 (2003)

    MathSciNet  Google Scholar 

  8. Babbage, S.: Improved exhaustive search attacks on stream cipher. In: European Convention on Security and Detection, IEEE Conference Publication, vol. 408, pp. 161–166 (1995)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ngoc Thanh Nguyen Geun Sik Jo Robert J. Howlett Lakhmi C. Jain

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, H., Lee, H., Moon, S. (2008). A Security Enhancement of the E0 Cipher in Bluetooth System. In: Nguyen, N.T., Jo, G.S., Howlett, R.J., Jain, L.C. (eds) Agent and Multi-Agent Systems: Technologies and Applications. KES-AMSTA 2008. Lecture Notes in Computer Science(), vol 4953. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78582-8_87

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-78582-8_87

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-78581-1

  • Online ISBN: 978-3-540-78582-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics