Skip to main content

Edit distance correlation attacks on clock-controlled combiners with memory

  • Session 5: Stream Ciphers
  • Conference paper
  • First Online:
Information Security and Privacy (ACISP 1996)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1172))

Included in the following conference series:

  • 148 Accesses

Abstract

Edit distance based correlation attacks on binary keystream generators consisting of clock-controlled shift registers combined by a function with memory are introduced. Recursive algorithms for efficient computation of the proposed many-to-one string edit distances are derived for both the constrained and unconstrained irregular clocking. The distances are based on mutually correlated input and output feedforward linear transforms for regularly clocked combiners with memory. Linear transforms can also incorporate linear models of clock-controlled shift registers. In particular, linear transforms and the corresponding correlation coefficients are obtained for a special type of combiners with memory based on a time-varying memoryless function.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. D. Coppersmith, H. Krawczyk, and Y. Mansour, ”The shrinking generator,” Advances in Cryptology — CRYPTO '93, Lecture Notes in Computer Science, vol. 773, D. R. Stinson ed., Springer-Verlag, pp. 22–39, 1994.

    Google Scholar 

  2. J. Dj. Golić and M. J. Mihaljević, ”Minimal linear equivalent analysis of a variable-memory binary sequence generator,” IEEE Trans. Inform. Theory, vol. IT-36, pp. 190–192, Jan. 1990.

    Google Scholar 

  3. J. Dj. Golić and M. J. Mihaljević, ”A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance,” J. Cryptology, vol. 3(3), pp. 201–212, 1991.

    Google Scholar 

  4. J. Dj. Golić, ”Correlation via linear sequential circuit approximation of combiners with memory,” Advances in Cryptology — EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 113–123, 1993.

    Google Scholar 

  5. J. Dj. Golić and S. V. Petrović, ”A generalized correlation attack with a probabilistic constrained edit distance,” Advances in Cryptology — EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 472–476, 1993.

    Google Scholar 

  6. J. Dj. Golić, ”On the security of shift register based keystream generators,” Fast Software Encryption — Cambridge '93, Lecture Notes in Computer Science, vol. 809, R. J. Anderson ed., Springer-Verlag, pp. 90–100, 1994.

    Google Scholar 

  7. J. Dj. Golić and L. O'Connor, ”Embedding and probabilistic correlation attacks on clock-controlled shift registers,” Advances in Cryptology — EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, A. De Santis ed., Springer-Verlag, pp. 230–243, 1995.

    Google Scholar 

  8. J. Dj. Golić, ”Intrinsic statistical weakness of keystream generators,” Advances in Cryptology — ASIACRYPT '94, Lecture Notes in Computer Science, vol. 917, J. Pieprzyk and R. Safavi-Naini eds., Springer-Verlag, pp. 91–103, 1995.

    Google Scholar 

  9. J. Dj. Golić, ”Correlation properties of a general binary combiner with memory,” J. Cryptology, vol. 9(2), pp. 111–126, 1996.

    Google Scholar 

  10. J. Dj. Golić, ”Linear models for keystream generators,” IEEE Trans. Comput., vol. C-45, pp. 41–49, 1996.

    Google Scholar 

  11. D. Gollmann and W. G. Chambers, ”Clock-controlled shift registers: a review,” IEEE J. Select. Areas Commun., vol. 7(4), pp. 525–533, May 1989.

    Google Scholar 

  12. M. D. MacLaren and G. Marsaglia, ”Uniform random number generators,” J. Ass. Comput. Machinery, vol. 15, pp. 83–89, 1965.

    Google Scholar 

  13. W. Meier and O. Staffelbach, ”Fast correlation attacks on certain stream ciphers,” J. Cryptology, vol. 1(3), pp. 159–176, 1989.

    Google Scholar 

  14. W. Meier and O. Staffelbach, ”Correlation properties of combiners with memory in stream ciphers,” J. Cryptology, vol. 5(1), pp. 67–86, 1992.

    Google Scholar 

  15. M. J. Mihaljević, ”An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure,” Advances in Cryptology — AUSCRYPT '92, Lecture Notes in Computer Science, vol. 718, J. Seberry and Y. Zheng eds., Springer-Verlag, pp. 349–356, 1993.

    Google Scholar 

  16. R. A. Rueppel, ”Correlation immunity and the summation generator,” Advances in Cryptology — CRYPTO '85, Lecture Notes in Computer Science, vol. 218, H. C. Williams ed., Springer-Verlag, pp. 260–272, 1986.

    Google Scholar 

  17. R. A. Rueppel, ”Stream ciphers,” in Contemporary Cryptology: The Science of Information Integrity, G. Simmons ed., pp. 65–134. New York: IEEE Press, 1991.

    Google Scholar 

  18. T. Siegenthaler, ”Correlation-immunity of nonlinear combining functions for cryptographic applications,” IEEE Trans. Inform. Theory, vol. IT-30, pp. 776–780, Sep. 1984.

    Google Scholar 

  19. T. Siegenthaler, ”Decrypting a class of stream ciphers using ciphertext only,” IEEE Trans. Comput., vol. C-34, pp. 81–85, Jan. 1985.

    Google Scholar 

  20. G. Z. Xiao and J. L. Massey, ”A spectral characterization of correlation-immune combining functions,” IEEE Trans. Inform. Theory, vol. IT-34, pp. 569–571, May 1988.

    Google Scholar 

  21. M. V. Živković, ”An algorithm for the initial state reconstruction of the clock-controlled shift register,” IEEE Trans. Inform. Theory, vol. IT-37, pp. 1488–1490, Sep. 1991.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Josef Pieprzyk Jennifer Seberry

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Golić, J.D. (1996). Edit distance correlation attacks on clock-controlled combiners with memory. In: Pieprzyk, J., Seberry, J. (eds) Information Security and Privacy. ACISP 1996. Lecture Notes in Computer Science, vol 1172. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0023297

Download citation

  • DOI: https://doi.org/10.1007/BFb0023297

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-61991-8

  • Online ISBN: 978-3-540-49583-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics