Skip to main content

A cryptanalysis of clock-controlled shift registers with multiple steps

  • Conference paper
  • First Online:
Cryptography: Policy and Algorithms (CPA 1995)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1029))

Included in the following conference series:

Abstract

A clock-controlled shift register that is clocked at least once and at most d + 1 times per output symbol is cryptanalyzed using a constrained embedding approach. Upper bounds on the constrained embedding probabilities that are exponentially small in the string length are derived using finite automata theory and generating functions. A known constrained embedding divide-and-conquer attack on a clock-controlled shift-register developed for at most two clocks at a time (d=1) is thus extended to the general case of arbitrary d. The results show that the minimum length of the observed output sequence needed for successful initial state reconstruction is linear in the shift register length, and at least exponential and at most superexponential in d. This proves that by making d large one cannot achieve the theoretical security against the embedding attack. Experimental results obtained by computer simulations indicate that the required output sequence length is only exponential in d, which would mean that the embedding attack is feasible if d is not too large.

This research was supported in part by the Science Fund of Serbia, grant #0403, through the Institute of Mathematics, Serbian Academy of Arts and Sciences.

The work reported in this paper has been funded in part by the Cooperative Research Centres program through the Department of the Prime Minister and Cabinet of Australia.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R. J. Anderson. Solving a class of stream ciphers. Cryptologia, 14(3):285–288, 1990.

    Google Scholar 

  2. W. G. Chambers and D. Gollmann. Lock-in effect in cascades of clock-controlled shift registers. Advances in Cryptology-EUROCRYPT '88, Lecture Notes in Computer Science, vol. 330, C. G. Günther ed., Springer-Verlag, pages 331–342, 1988.

    Google Scholar 

  3. C. Ding, G. Xiao, and W. Shan. The Stability Theory of Stream Ciphers. Lecture Notes in Computer Science, vol. 561, Springer-Verlag, 1991.

    Google Scholar 

  4. W. Feller. An Introduction to Probability Theory and its Applications. New York: Wiley, 3rd edition, Volume 1, 1968.

    Google Scholar 

  5. J. Dj. Golić and M. V. Živković. On the linear complexity of nonuniformly decimated PN-sequences. IEEE Transactions on Information Theory, 34:1077–1079, Sep. 1988.

    Google Scholar 

  6. J. Dj. Golić and M. J. Mihaljević. A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance. Journal of Cryptology, 3(3):201–212, 1991.

    Google Scholar 

  7. J. Dj. Golić and L. O'Connor. Embedding and probabilistic correlation attacks on clock-controlled shift registers. Advances in Cryptology-EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, A. De Santis ed., Springer-Verlag, pages 230–243, 1995.

    Google Scholar 

  8. J. Dj. Golić. Intrinsic statistical weakness of keystream generators. Advances in Cryptology-ASIACRYPT '94, Lecture Notes in Computer Science, vol. 917, J. Pieprzyk and R. Safavi-Naini eds., Springer-Verlag, pages 91–103, 1995.

    Google Scholar 

  9. J. Dj. Golić. Constrained embedding probability for two binary strings. To appear in SIAM Journal on Discrete Mathematics.

    Google Scholar 

  10. D. Gollmann and W. G. Chambers. Clock controlled shift registers: a review. IEEE Journal on Selected Areas in Communications, 7(4):525–533, 1989.

    Google Scholar 

  11. D. Gollmann and W. G. Chambers. A cryptanalysis of stepk,m-cascades. Advances in Cryptology-EUROCRYPT '89, Lecture Notes in Computer Science, vol. 434, J.-J. Quisquater, J. Vandewalle eds., Springer-Verlag, pages 680–687, 1990.

    Google Scholar 

  12. J. Hopcroft and J. Ullman. An Introduction to Automata, Languages and Computation. Reading, MA: Addison Wesley, 1979.

    Google Scholar 

  13. S.-J. Lee, S.-J. Park, and S.-C. Goh. On the security of the Gollmann cascades. Advances in Cryptology-CRYPTO '95, Lecture Notes in Computer Science, vol. 963, D. Coppersmith ed., Springer-Verlag, pages 148–157, 1995.

    Google Scholar 

  14. R. Menicocci. Cryptanalysis of a two-stage Gollmann cascade generator. In Proceedings of SPRC '93, Rome, Italy, pages 62–69, 1993.

    Google Scholar 

  15. R. Menicocci. Short Gollmann cascade generators may be insecure. In CODES AND CYPHERS, Cryptography and Coding IV, P. G. Farrell ed., The Institute of Mathematics and Its Applications, pages 281–297, 1995.

    Google Scholar 

  16. R. Menicocci. A systematic attack on clock controlled cascades. Advances in Cryptology-EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, A. De Santis ed., Springer-Verlag, pages 450–455, 1995.

    Google Scholar 

  17. F. Roberts. Applied Combinatorics. Englewood Cliffs, NJ: Prentice Hall, 1984.

    Google Scholar 

  18. K. C. Zeng, C. H. Yang, and T. R. N. Rao. On the linear consistency test (LCT) in cryptanalysis and its applications. Advances in Cryptology-CRYPTO '89, Lecture Notes in Computer Science, vol. 435, G. Brassard ed., Springer-Verlag, pages 164–174, 1990.

    Google Scholar 

  19. M. V. Živković. An algorithm for the initial state reconstruction of the clock-controlled shift register. IEEE Transactions on Information Theory, 37:1488–1490, Sep. 1991.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Ed Dawson Jovan Golić

Rights and permissions

Reprints and permissions

Copyright information

© 1996 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Golić, J.D., O'Connor, L. (1996). A cryptanalysis of clock-controlled shift registers with multiple steps. In: Dawson, E., Golić, J. (eds) Cryptography: Policy and Algorithms. CPA 1995. Lecture Notes in Computer Science, vol 1029. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0032357

Download citation

  • DOI: https://doi.org/10.1007/BFb0032357

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-60759-5

  • Online ISBN: 978-3-540-49363-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics