Abstract
A clock-controlled shift register that is clocked at least once and at most d + 1 times per output symbol is cryptanalyzed using a constrained embedding approach. Upper bounds on the constrained embedding probabilities that are exponentially small in the string length are derived using finite automata theory and generating functions. A known constrained embedding divide-and-conquer attack on a clock-controlled shift-register developed for at most two clocks at a time (d=1) is thus extended to the general case of arbitrary d. The results show that the minimum length of the observed output sequence needed for successful initial state reconstruction is linear in the shift register length, and at least exponential and at most superexponential in d. This proves that by making d large one cannot achieve the theoretical security against the embedding attack. Experimental results obtained by computer simulations indicate that the required output sequence length is only exponential in d, which would mean that the embedding attack is feasible if d is not too large.
This research was supported in part by the Science Fund of Serbia, grant #0403, through the Institute of Mathematics, Serbian Academy of Arts and Sciences.
The work reported in this paper has been funded in part by the Cooperative Research Centres program through the Department of the Prime Minister and Cabinet of Australia.
Preview
Unable to display preview. Download preview PDF.
References
R. J. Anderson. Solving a class of stream ciphers. Cryptologia, 14(3):285–288, 1990.
W. G. Chambers and D. Gollmann. Lock-in effect in cascades of clock-controlled shift registers. Advances in Cryptology-EUROCRYPT '88, Lecture Notes in Computer Science, vol. 330, C. G. Günther ed., Springer-Verlag, pages 331–342, 1988.
C. Ding, G. Xiao, and W. Shan. The Stability Theory of Stream Ciphers. Lecture Notes in Computer Science, vol. 561, Springer-Verlag, 1991.
W. Feller. An Introduction to Probability Theory and its Applications. New York: Wiley, 3rd edition, Volume 1, 1968.
J. Dj. Golić and M. V. Živković. On the linear complexity of nonuniformly decimated PN-sequences. IEEE Transactions on Information Theory, 34:1077–1079, Sep. 1988.
J. Dj. Golić and M. J. Mihaljević. A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance. Journal of Cryptology, 3(3):201–212, 1991.
J. Dj. Golić and L. O'Connor. Embedding and probabilistic correlation attacks on clock-controlled shift registers. Advances in Cryptology-EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, A. De Santis ed., Springer-Verlag, pages 230–243, 1995.
J. Dj. Golić. Intrinsic statistical weakness of keystream generators. Advances in Cryptology-ASIACRYPT '94, Lecture Notes in Computer Science, vol. 917, J. Pieprzyk and R. Safavi-Naini eds., Springer-Verlag, pages 91–103, 1995.
J. Dj. Golić. Constrained embedding probability for two binary strings. To appear in SIAM Journal on Discrete Mathematics.
D. Gollmann and W. G. Chambers. Clock controlled shift registers: a review. IEEE Journal on Selected Areas in Communications, 7(4):525–533, 1989.
D. Gollmann and W. G. Chambers. A cryptanalysis of stepk,m-cascades. Advances in Cryptology-EUROCRYPT '89, Lecture Notes in Computer Science, vol. 434, J.-J. Quisquater, J. Vandewalle eds., Springer-Verlag, pages 680–687, 1990.
J. Hopcroft and J. Ullman. An Introduction to Automata, Languages and Computation. Reading, MA: Addison Wesley, 1979.
S.-J. Lee, S.-J. Park, and S.-C. Goh. On the security of the Gollmann cascades. Advances in Cryptology-CRYPTO '95, Lecture Notes in Computer Science, vol. 963, D. Coppersmith ed., Springer-Verlag, pages 148–157, 1995.
R. Menicocci. Cryptanalysis of a two-stage Gollmann cascade generator. In Proceedings of SPRC '93, Rome, Italy, pages 62–69, 1993.
R. Menicocci. Short Gollmann cascade generators may be insecure. In CODES AND CYPHERS, Cryptography and Coding IV, P. G. Farrell ed., The Institute of Mathematics and Its Applications, pages 281–297, 1995.
R. Menicocci. A systematic attack on clock controlled cascades. Advances in Cryptology-EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, A. De Santis ed., Springer-Verlag, pages 450–455, 1995.
F. Roberts. Applied Combinatorics. Englewood Cliffs, NJ: Prentice Hall, 1984.
K. C. Zeng, C. H. Yang, and T. R. N. Rao. On the linear consistency test (LCT) in cryptanalysis and its applications. Advances in Cryptology-CRYPTO '89, Lecture Notes in Computer Science, vol. 435, G. Brassard ed., Springer-Verlag, pages 164–174, 1990.
M. V. Živković. An algorithm for the initial state reconstruction of the clock-controlled shift register. IEEE Transactions on Information Theory, 37:1488–1490, Sep. 1991.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Golić, J.D., O'Connor, L. (1996). A cryptanalysis of clock-controlled shift registers with multiple steps. In: Dawson, E., Golić, J. (eds) Cryptography: Policy and Algorithms. CPA 1995. Lecture Notes in Computer Science, vol 1029. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0032357
Download citation
DOI: https://doi.org/10.1007/BFb0032357
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60759-5
Online ISBN: 978-3-540-49363-1
eBook Packages: Springer Book Archive