Skip to main content

A probabilistic correlation attack on the shrinking generator

  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1998)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1438))

Included in the following conference series:

Abstract

A probabilistic correlation attack on irregularly clocked shift registers is applied in a divide and conquer attack on the shrinking generator. Systematic computer simulations show that the joint probability is a suitable basis for the correlation attack and that, given a keystream segment of length linear in the length of the clock-controlled shift register, the shift register initial states can be identified with high probability. The attack is conducted under the assumption that the secret key controls only the shift register initial states.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Coppersmith, H. Krawczyk and Y. Mansour. The shrinking generator. Advances in Cryptology — CRYPTO '93, volume 773 of Lecture Notes in Computer Science, pages 22–39. Springer-Verlag, 1993.

    Google Scholar 

  2. J. Dj. Golić and M. J. Mihaljević. A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance. Journal of Cryptology, 3(3):201–212, 1991.

    MathSciNet  Google Scholar 

  3. J. Dj. Golić and L. O'Connor. Embedding and probabilistic correlation attacks on clock-controlled shift registers. Advances in Cryptology — EUROCRYPT '94, volume 950 of Lecture Notes in Computer Science, pages 230–243. Springer-Verlag, 1994.

    Google Scholar 

  4. J. L. Massey. Shift-register synthesis and BCH decoding. IEEE Trans. Inform. Theory, IT-15:122–127, Jan. 1969.

    Article  MathSciNet  Google Scholar 

  5. H. Schildt. C the Complete Reference. Osborne McGraw-Hill, Berkeley, CA, 1990.

    Google Scholar 

  6. K. C. Zeng, C. H. Yang,, and T. R. N. Rao. On the linear consistency test (LCT) in cryptanalysis and its applications. Advances in Cryptology — CRYPTO '89, volume 434 of Lecture Notes in Computer Science, pages 164–174. Springer-Verlag, 1990.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Colin Boyd Ed Dawson

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Simpson, L., Golić, J.D., Dawson, E. (1998). A probabilistic correlation attack on the shrinking generator. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053729

Download citation

  • DOI: https://doi.org/10.1007/BFb0053729

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-64732-4

  • Online ISBN: 978-3-540-69101-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics