Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Linear Consistency Attack

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 80 Accesses

The linear consistency attack is a divide-and-conquer technique which provides a known plaintext attack on stream ciphers. It was introduced by Zeng et al. in 1989. It has been applied to various keystream generators, like the Jenning generator [2], the stop-and-go generator of Beth and Piper [2], and the E0 cipher used in Bluetooth [1].

The linear consistency attack applies as soon as it is possible to single out a portion K 1 of the secret key and to form a system \( Ax = b \) of linear equations, where the matrix A only depends on K 1 and the right-side vector b is determined by the known keystream bits. Then, an exhaustive key search on K 1 can be performed. The correct value of K i can be distinguished from a wrong one by checking whether the linear system is consistent or not. Once K i has been recovered, the solution x of the system may provide some additional bits of the secret key.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Fluhrer, S.R. and S. Lucks (2001). “Analysis of the E0 encryption system.” Selected Areas in Cryptography—SAC 2001, Lecture Notes in Computer Science, vol. 2259, eds. S. Vaudenay and A.M. Youssef. Springer-Verlag, Berlin, 38–48.

    Google Scholar 

  2. Zeng, K., C.H. Yang, and T.R.N. Rao (1989). “On the linear consistency test (LCT) in cryptanalysis with applications.” Advances in Cryptology—CRYPTO'89, Lecture Notes in Computer Science, vol. 435, ed. G. Brassard. Springer-Verlag, Berlin, 164–174.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Canteaut, A. (2005). Linear Consistency Attack. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_232

Download citation

Publish with us

Policies and ethics