Abstract
A family of keystream generators, called the LILI keystream generators, is proposed for use in stream cipher applications and the security of these generators is investigated with respect to currently known attacks. The design is simple and scalable, based on two binary linear feedback shift registers combined in a simple way, using both irregular clocking and nonlinear functions. The design provides the basic security requirements such as a long period and high linear complexity, and is resistant to known cryptanalytic attacks.
Chapter PDF
Similar content being viewed by others
References
R. Anderson. Searching for the Optimum Correlation Attack. In Fast Software Encryption-Leuven ’94, volume 1008 of Lecture Notes in Computer Science, pages 137–143. Springer-Verlag, 1995.
G. R. Blakley and G. B. Purdy. A Necessary and Suficient Condition for Fundamental Periods of Cascade Machines to be Products of the Fundamental Periods of their Constituent Finite State Machines. Information Sciences, vol. 24, pp. 71–91, 1981.
D. Bleichenbacher and S. Patel. SOBER Cryptanalysis. In Fast Software Encryption-Rome ’99, volume 1636 of Lecture Notes in Computer Science, pages 305–316. Springer-Verlag, 1999.
C. Ding, G. Xiao and W. Shan. The Stability Theory of Stream Ciphers. Volume 561 of Lecture Notes in Computer Science. Springer-Verlag, 1991.
J. Dj. Golić and M. Živković. On the Linear Complexity of Nonuniformly Decimated PN-Sequences. IEEE Trans. Inform. Theory, vol. IT-34, pp. 1077–1079, 1988.
J. Dj. Golić and M. J. Mihaljević. A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. Journal of Cryptology, vol. 3(3), pp. 201–212, 1991.
J. Dj. Golić and S. Petrović. A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance. In Advances in Cryptology-EUROCRYPT ’92, volume 658 of Lecture Notes in Computer Science, pages 472–476. Springer-Verlag, 1992.
J. Dj. Golić and L. O’Connor. Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. In Advances in Cryptology-EUROCRYPT ’94, volume 950 of Lecture Notes in Computer Science, pages 230–243. Springer-Verlag, 1994.
J. Dj. Golić. On the Security of Nonlinear Filter Generators. In Fast Software Encryption-Cambridge ’96, volume 1039 of Lecture Notes in Computer Science, pages 173–188. Springer-Verlag, 1996.
J. Massey. Shift-Register Synthesis and BCH Decoding. IEEE Trans. Inform. Theory, vol. IT-15, pp. 122–127, Jan. 1969.
W. Meier and O. Staffelbach. Fast Correlation Attacks on Certain Stream Ciphers. Journal of Cryptology, vol. 1(3), pp. 159–167, 1989.
G. Rose. A Stream Cipher Based on Linear Feedback over GF(28). In Information Security and Privacy-Brisbane ’98, volume 1438 of Lecture Notes in Computer Science, pages 135–146. Springer-Verlag, 1998.
R. Rueppel. Analysis and Design of Stream Ciphers. Springer-Verlag, Berlin, 1986.
M. Salmasizadeh, L. Simpson, J. Dj. Golić and E. Dawson. Fast Correlation Attacks and Multiple Linear Approximations. In Information Security and Privacy-Nepean ’97, volume 1270 of Lecture Notes in Computer Science, pages 228–239. Springer-Verlag, 1997.
P. Sarkar and S. Maitra. Nonlinearity Bounds and Constructions of Resilient Boolean Functions. In Advances in Cryptology-CRYPTO 2000, volume 1880 of Lecture Notes in Computer Science, pages 515–532. Springer-Verlag, 2000.
T. Siegenthaler. Decrypting a Class of Stream Ciphers Using Ciphertext Only. IEEE Trans. Computers, vol. C-34(1), pp. 81–85, 1985.
L. Simpson, J. Dj. Golić and E. Dawson. A Probabilistic Correlation Attack on the Shrinking Generator. In Information Security and Privacy-Brisbane ’98, volume 1438 of Lecture Notes in Computer Science, pages 147–158. Springer-Verlag, 1998.
L. Simpson. Divide and Conquer Attacks on Shift Register Based Stream Ciphers. PhD thesis, Information Security Research Centre, Queensland University of Technology, Brisbane, Australia, November 1999.
D. Wagner, L. Simpson, E. Dawson, J. Kelsey, W. Millan and B. Schneier. Cryptanalysis of ORYX. In Proceedings of the Fifth AnnualWorkshop on Selected Areas in Cryptography-SAC ’98, volume 1556 of Lecture Notes in Computer Science, pages 296–305. Springer-Verlag, 1998.
K. C. Zeng, C. H. Yang and T. R. N. Rao. On the Linear Consistency Test (LCT) in Cryptanalysis with Applications. In Advances in Cryptology-CRYPTO ’89, volume 434 of Lecture Notes in Computer Science, pages 164–174. Springer-Verlag, 1990.
M. Živković. An Algorithm for the Initial State Reconstruction of the Clock-Controlled Shift Register. IEEE Trans. Inform. Theory, vol. IT-37, pp. 1488–1490, Sept. 1991.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ruth Simpson, L., Dawson, E., Golić, J.D., Millan, W.L. (2001). LILI Keystream Generator. In: Stinson, D.R., Tavares, S. (eds) Selected Areas in Cryptography. SAC 2000. Lecture Notes in Computer Science, vol 2012. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-44983-3_18
Download citation
DOI: https://doi.org/10.1007/3-540-44983-3_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42069-9
Online ISBN: 978-3-540-44983-6
eBook Packages: Springer Book Archive