Abstract
Many bitstream generators are based on linear feedback shift registers. A widespread technique for the cryptanalysis of those generators is the linear consistency test (LCT). In this paper, we consider an application of the LCT in cryptanalysis of clock-controlled bitstream generators, called clock control guessing. We give a general and very simple method for estimating the efficiency of clock control guessing, yielding an upper bound on the effective key length of a whole group of bitstream generators. Finally, we apply the technique against a number of clock-controlled generators, such as the A5/1, alternating step generator, step1-step2 generator, cascade generator, and others.
This work was partially supported by the LGF Baden-W urttemberg.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
S. Babbage. Cryptanalysis of LILI-128. Technical report, Nessie project, 2001. http://www.cosic.esat.kuleuven.ac.be/nessie/reports/. 211
T. Beth and F. Piper. The stop-and-go generator. In T. Beth, N. Cot, and I. Ingemarsson, editors, Advances in Cryptology-Eurocrypt’ 84, volume 209 of LNCS, pages 88–92. Springer, 1985. 209
M. Briceno, I. Goldberg, and D. Wagner. A pedagogical implementation of A5/1. http://www.scard.org/gsm/a51.html. 207
D. Coppersmith, H. Krawczyk, and Y. Mansour. The shrinking generator. In D.R. Stinson, editor, Advances in Cryptology-Eurocrypt’ 93, volume 773 of LNCS, pages 22–39, Berlin, 1993. Springer. 202, 210
E. Dawson and A. Clark. Divide and conquer attacks on certain classes of stream ciphers. Cryptologia, 18(4):25–40, 1994. 202
J.D. Golić. Cryptanalysis of alleged A5 stream cipher. In W. Fumy, editor, Advances in Cryptology-Eurocrypt’ 97, volume 1233 of LNCS, pages 239–255, Berlin, 1997. Springer. 203, 207
J.D. Golić. Cryptanalysis of three mutually clock-controlled stop/go shift registers. IEEE Trans. Inf. Theory, 46(3):1081–1090, May 2000. 201, 207, 208
D. Gollmann and W. Chambers. Clock-controlled shift registers: A review. IEEE J. Selected Areas Comm., 7(4):525–533, May 1989. 210
S. Golomb. Shift Register Sequences. Aegean Park Press, Laguna Hills (CA), revised edition, 1982. 200
C. Günther. Alternating step generators controlled by de Bruijn sequences. In D. Chaum and W. Price, editors, Advances in Cryptology-Eurocrypt’ 87, volume 304 of LNCS, pages 88–92. Springer, 1988. 202
F. Jönsson and T. Johansson. A fast correlation attack on LILI-128. Technical report, Lund University, Sweden, 2001. 211
M. Krause. BDD-based cryptanalysis of keystream generators. In L.T Knudsen, editor, Advances in Cryptology-Eurocrypt’ 02, LNCS. Springer, 2002. 205
W. Meier and O. Staffelbach. The self-shrinking generator. In A. De Santis, editor, Advances in Cryptology-Eurocrypt’ 94, volume 950 of LNCS, pages 205–214, Berlin, 1995. Springer. 211
T. Pornin and J. Stern. Software-hardware trade-offs: Application to A5/1 cryptanalysis. In Ç. KoÇ and C. Paar, editors, Proc. CHES 2000, volume 1965 of LNCS, pages 318–327. Springer, 2000. 201, 207
R. Rueppel. Stream ciphers. In G. Simmons, editor, Contemporary Cryptology-The Science of Information Integrity, pages 65–134. IEEE Press, 1992. 201
M.-J. Saarinen. A time-memory tradeoff attack against LILI-128. In J. Daemen and V. Rijmen, editors, Proc. FSE 2002, volume 2365 of LNCS, pages 231–236. Springer, 2002. 211
L. Simpson, E. Dawson, J. Golić, and W. Millan. LILI keystream generator. In D. Stinson and S. Tavares, editors, Proc. SAC 2000, volume 2012 of LNCS, pages 248–261. Springer, 2001. 211
K. Zeng, C. Yang, and Y. Rao. On the linear consistency test (LCT) in cryptanalysis with applications. In G. Brassard, editor, Advances in Cryptology-Crypto’ 89, volume 435 of LNCS, pages 164–174. Springer, 1990. 201, 202, 203
E. Zenner. Kryptographische Protokolle im GSM-Standard-Beschreibung und Kryptanalyse. Master’s thesis, University of Mannheim, 1999. 201, 207
E. Zenner, M. Krause, and S. Lucks. Improved cryptanalysis of the self-shrinking generator. In V. Varadharajan and Y. Mu, editors, Proc. ACISP’ 01, volume 2119 of LNCS, pages 21–35. Springer, 2001. 203, 211
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Zenner, E. (2003). On the Efficiency of the Clock Control Guessing Attack. In: Lee, P.J., Lim, C.H. (eds) Information Security and Cryptology — ICISC 2002. ICISC 2002. Lecture Notes in Computer Science, vol 2587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36552-4_14
Download citation
DOI: https://doi.org/10.1007/3-540-36552-4_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00716-6
Online ISBN: 978-3-540-36552-5
eBook Packages: Springer Book Archive