Abstract
A probabilistic correlation attack on irregularly clocked shift registers is applied in a divide and conquer attack on the shrinking generator. Systematic computer simulations show that the joint probability is a suitable basis for the correlation attack and that, given a keystream segment of length linear in the length of the clock-controlled shift register, the shift register initial states can be identified with high probability. The attack is conducted under the assumption that the secret key controls only the shift register initial states.
Preview
Unable to display preview. Download preview PDF.
References
D. Coppersmith, H. Krawczyk and Y. Mansour. The shrinking generator. Advances in Cryptology — CRYPTO '93, volume 773 of Lecture Notes in Computer Science, pages 22–39. Springer-Verlag, 1993.
J. Dj. Golić and M. J. Mihaljević. A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance. Journal of Cryptology, 3(3):201–212, 1991.
J. Dj. Golić and L. O'Connor. Embedding and probabilistic correlation attacks on clock-controlled shift registers. Advances in Cryptology — EUROCRYPT '94, volume 950 of Lecture Notes in Computer Science, pages 230–243. Springer-Verlag, 1994.
J. L. Massey. Shift-register synthesis and BCH decoding. IEEE Trans. Inform. Theory, IT-15:122–127, Jan. 1969.
H. Schildt. C the Complete Reference. Osborne McGraw-Hill, Berkeley, CA, 1990.
K. C. Zeng, C. H. Yang,, and T. R. N. Rao. On the linear consistency test (LCT) in cryptanalysis and its applications. Advances in Cryptology — CRYPTO '89, volume 434 of Lecture Notes in Computer Science, pages 164–174. Springer-Verlag, 1990.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Simpson, L., Golić, J.D., Dawson, E. (1998). A probabilistic correlation attack on the shrinking generator. In: Boyd, C., Dawson, E. (eds) Information Security and Privacy. ACISP 1998. Lecture Notes in Computer Science, vol 1438. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0053729
Download citation
DOI: https://doi.org/10.1007/BFb0053729
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64732-4
Online ISBN: 978-3-540-69101-3
eBook Packages: Springer Book Archive