Abstract
A binary sequence generator (BSG) consisting of three regularly clocked linear feedback shift registers combined by a time-varying memoryless function is cryptanalysed. A novel distance measure for the binary sequences comparison relevant for the crypanalysis is proposed, its main characteristics are derived, and the divide and conquer correlation attack based on this distance is presented. It is pointed out that the novel distance based approach to cryptanalysis could be applied for attacking the binary MacLaren-Marsaglia shuffler, for signficant improvement of the correlation attack on the multiplexer BSG, and for attacking a wide class of BSG's in which the output binary sequence is a time-varying function of certain subgenerator output binary sequence.
Preview
Unable to display preview. Download preview PDF.
References
T. Siegenthaler, ”Decrypting a class of stream ciphers using ciphertext only”, IEEE Trans. Comput., vol. 34, pp. 81–85, Jan. 1985.
W. Meier and O. Staffelbach, ”Fast correlation attacks on certain stream ciphers”, Journal of Cryptology, vol. 1, pp. 159–176, 1989.
K.C. Zeng and M. Huang, ”On the linear syndrome algorithm in cryptanalysis with applications”, Advances in Cryptology — CRYPTO '88, Lecture Notes in Computer Science, vol. 403, pp. 469–478, 1990.
M.J. Mihaljević and J.Dj. Golić, ”Convergence of a Bayesian iterative errorcorrection procedure on a noisy shift register sequence”, Advances in Cryptology — EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, pp. 124–137, 1993.
J.Dj. Golić and M.J. Mihaljević, ”A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance”, Journal of Cryptology, vol. 3, pp. 201–212, 1991.
J.Dj. Golić, ”On the security of shift register based keystream generators”, Fast Software Encryption, Lecture Notes in Computer Science, vol. 809, pp. 91–101, 1994.
M.D. MacLaren and G. Marsaglia, ”Uniform random number generators”, Jour. Ass. Comput. Machnery, vol. 12, pp. 93–89, 1968.
W.G. Chambers, ”Clock-controlled shift registers in binary sequence generators”, IEE Proceedings, Pt. E, vol. 135, pp. 17–23, 1988.
G. Marsaglia and T.A. Bray, ”One-line random number generators and their use in combinations”, Comm. Ass. Comput. Machinery, vol. 11, pp. 757–759, 1968.
D.E. Knuth, The art of computer programming Vol.2: Seminumerical algorithms. Reading, MA: Addison-Wesley, 1981.
C.T. Retter, ”A key-search attack on MacLaren-Marsaglia system”, Cryptologia, vol. 9, pp. 114–130, 1985.
J.Dj. Golić and M.J. Mihaljević, ”Minimal linear equivalent analysis of a variable memory binary sequences generator”, IEEE Trans. Inform. Theory, vol. 36, pp. 190–192, 1990.
P.R. Geffe, ”How to protect data with ciphers that are really hard to break”, Electronics, pp. 99–101, Jan. 1973.
J.Dj. Golić, ”The number of output sequences of a binary sequence generator”, Advances in Cryptology — EUROCRYPT '91, Lecture Notes in Computer Science, vol. 547, pp. 160–167, 1991.
R. Menicocci, ”Intrinsic weakness of variable-memory keystream generators”, Electronics Letters, vol. 30, No. 11, pp. 850–851, 1994.
S.M. Jennings, ”Multiplexed sequences: Some properties of the minimum polynomial”, Proc. Workshop on Cryptography, Lecture Notes in Computer Science, vol. 149, pp. 189–206, 1982.
D.Sankoff and J.B.Kruskal, Time warps, string edits and macromolecules: The theory and practice of sequence comparison. Reading, MA: Addison-Wesley, 1983.
A.Levenshtein, ”Binary codes capable of correcting deletions, insertions, and reversals”, Sov. Phy. Dokl., vol. 10, pp. 707–710, 1966.
P.A. Devijver and J. Kittler, Pattern recognition: A statistical approach. London: Prentice Hall, 1982.
K.C. Zeng, C.H. Yang, and T.R.N. Rao, ”On the linear consistency test (LCT) in cryptanalysis and its applications”, Advances in Cryptology — CRYPTO '90, Lecture Notes in Computer Science, vol. 537, pp. 34–47, 1991.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mihaljević, M.J. (1995). A correlation attack on the binary sequence generators with time-varying output function. In: Pieprzyk, J., Safavi-Naini, R. (eds) Advances in Cryptology — ASIACRYPT'94. ASIACRYPT 1994. Lecture Notes in Computer Science, vol 917. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0000425
Download citation
DOI: https://doi.org/10.1007/BFb0000425
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-59339-3
Online ISBN: 978-3-540-49236-8
eBook Packages: Springer Book Archive