首页 | 本学科首页   官方微博 | 高级检索  
     


Strategic attack on the shrinking generator
Authors:A. Fú  ster-Sabater,P. Caballero-Gil
Affiliation:1. Institute of Applied Physics (C.S.I.C.), Serrano 144, 28006 Madrid, Spain;2. Department of Statistics, Operations Research and Computing, Faculty of Mathematics, University of La Laguna, 38271 Tenerife, Spain
Abstract:The shrinking generator is a simple keystream generator with applications in stream ciphers, which is still considered as a secure generator. This work shows that, in order to cryptanalyze it, fewer intercepted bits than indicated by the linear complexity are necessary. Indeed, whereas the linear complexity of shrunken sequences is between A⋅2(S−2)A2(S2) and A⋅2(S−1)A2(S1), we claim that the initial states of both component registers are easily computed with fewer than A⋅SAS shrunken bits located at particular positions. Such a result is proven thanks to the definition of shrunken sequences as interleaved sequences. Consequently, it is conjectured that this statement can be extended to all interleaved sequences. Furthermore, this paper confirms that certain bits of the interleaved sequences have a greater strategic importance than others, which must be considered as a proof of weakness of interleaved generators.
Keywords:Stream cipher   Shrinking generator   Interleaved sequence   Cryptanalysis
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号