메뉴 건너뛰기




Volumn 3621 LNCS, Issue , 2006, Pages 97-117

The conditional correlation attack: A practical attack on Bluetooth encryption

Author keywords

Bluetooth; Correlation; E0; Stream Ciphers

Indexed keywords

COMPUTER SOFTWARE; CORRELATION METHODS; CRYPTOGRAPHY; MATHEMATICAL MODELS; NONLINEAR FILTERING; SECURITY OF DATA; STATISTICAL METHODS;

EID: 33745130425     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (39)

References (31)
  • 1
    • 84948981360 scopus 로고
    • Searching for the optimum correlation attack
    • Fast Software Encryption 1994, B. Preneel Ed., Springer-Verlag
    • Ross Anderson, Searching for the Optimum Correlation Attack, Fast Software Encryption 1994, Lecture Notes in Computer Science, vol.1008, B. Preneel Ed., Springer-Verlag, pp. 137-143, 1994
    • (1994) Lecture Notes in Computer Science , vol.1008 , pp. 137-143
    • Anderson, R.1
  • 2
    • 35248840147 scopus 로고    scopus 로고
    • Algebraic attacks on combiners with memory
    • Advances in Cryptology - CRYPTO 2003, D. Boneh Ed., Springer-Verlag
    • Frederik Armknecht, Matthias Krause, Algebraic Attacks on Combiners with Memory, Advances in Cryptology - CRYPTO 2003, Lecture Notes in Computer Science, vol.2729, D. Boneh Ed., Springer-Verlag, pp. 162-175, 2003
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 162-175
    • Armknecht, F.1    Krause, M.2
  • 3
    • 24144437725 scopus 로고    scopus 로고
    • Extending the resynchronization attack
    • Selected Areas in Cryptography - SAC 2004, H. Handschuh and A. Hasan Eds., Springer-Verlag
    • Frederik Armknecht, Joseph Lano, Bart Preneel, Extending the Resynchronization Attack, Selected Areas in Cryptography - SAC 2004, Lecture Notes in Computer Science, vol. 3357, H. Handschuh and A. Hasan Eds., Springer-Verlag, pp. 19-38, 2005 (extended version available at http://eprint.iacr.org/2004/232)
    • (2005) Lecture Notes in Computer Science , vol.3357 , pp. 19-38
    • Armknecht, F.1    Lano, J.2    Preneel, B.3
  • 5
    • 35048894397 scopus 로고    scopus 로고
    • How far can we go beyond linear cryptanalysis?
    • Advances in Cryptology - ASIACRYPT 2004, P. J. Lee Ed., Springer-Verlag
    • Thomas Baignères, Pascal Junod, Serge Vaudenay, How Far Can We Go Beyond Linear Cryptanalysis?, Advances in Cryptology - ASIACRYPT 2004, Lecture Notes in Computer Science, vol.3329, P. J. Lee Ed., Springer-Verlag, pp. 432-450, 2004
    • (2004) Lecture Notes in Computer Science , vol.3329 , pp. 432-450
    • Baignères, T.1    Junod, P.2    Vaudenay, S.3
  • 6
    • 33646800113 scopus 로고    scopus 로고
    • November
    • Bluetooth™, Bluetooth Specification, version 1.2, pp. 903-948, November, 2003, available at http://irww.bluetooth.org
    • (2003) Bluetooth Specification, Version 1.2 , pp. 903-948
  • 7
    • 84948963512 scopus 로고    scopus 로고
    • Improved fast correlation attacks using paritycheck equations of weight 4 and 5
    • Advances in Cryptology - EUROCRYPT 2000, B. Preneel Ed., Springer-Verlag
    • Anne Canteaut, Michael Trabbia, Improved Fast Correlation Attacks Using Paritycheck Equations of Weight 4 and 5, Advances in Cryptology - EUROCRYPT 2000, Lecture Notes in Computer Science, vol.1807, B. Preneel Ed., Springer-Verlag, pp. 573-588, 2000
    • (2000) Lecture Notes in Computer Science , vol.1807 , pp. 573-588
    • Canteaut, A.1    Trabbia, M.2
  • 8
    • 84969367308 scopus 로고    scopus 로고
    • A simple algorithm for fast correlation attacks on stream ciphers
    • Fast Software Encryption 2000, B. Schneier Ed., Springer-Verlag
    • Vladimir V. Chepyzhov, Thomas Johansson, Ben Smeets, A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers, Fast Software Encryption 2000, Lecture Notes in Computer Science, vol.1978, B. Schneier Ed., Springer-Verlag, pp. 181-195, 2000
    • (2000) Lecture Notes in Computer Science , vol.1978 , pp. 181-195
    • Chepyzhov, V.V.1    Johansson, T.2    Smeets, B.3
  • 9
    • 84888039254 scopus 로고    scopus 로고
    • Fast correlation attacks: An algorithmic point of view
    • Advances in Cryptology - EUROCRYPT 2002, L. R. Knudsen Ed., Springer-Verlag
    • Philippe Chose, Antoine Joux, Michel Mitton, Fast Correlation Attacks: An Algorithmic Point of View, Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science, vol.2332, L. R. Knudsen Ed., Springer-Verlag, pp. 209-221, 2002
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 209-221
    • Chose, P.1    Joux, A.2    Mitton, M.3
  • 10
    • 35248849880 scopus 로고    scopus 로고
    • Fast algebraic attacks on stream ciphers with linear feedback
    • Advances in Cryptology - CRYPTO 2003, D. Boneh Ed., Springer-Verlag
    • Nicolas T. Courtois, Fast Algebraic Attacks on Stream Ciphers with Linear Feedback, Advances in Cryptology - CRYPTO 2003, Lecture Notes in Computer Science, vol.2729, D. Boneh Ed., Springer-Verlag, pp. 176-194, 2003
    • (2003) Lecture Notes in Computer Science , vol.2729 , pp. 176-194
    • Courtois, N.T.1
  • 13
    • 84949226395 scopus 로고    scopus 로고
    • Analysis of the E0 encryption system
    • Selected Areas in Cryptography - SAC 2001, S. Vaudenay and A. Youssef Eds., Springer-Verlag
    • Scott Fluhrer, Stefan Lucks, Analysis of the E0 Encryption System, Selected Areas in Cryptography - SAC 2001, Lecture Notes in Computer Science, vol. 2259, S. Vaudenay and A. Youssef Eds., Springer-Verlag, pp. 38-48, 2001
    • (2001) Lecture Notes in Computer Science , vol.2259 , pp. 38-48
    • Fluhrer, S.1    Lucks, S.2
  • 15
    • 0242549872 scopus 로고    scopus 로고
    • Correlation properties of a general binary combiner with memory
    • Nov.
    • Jovan Dj. Golić, Correlation Properties of a General Binary Combiner with Memory, Journal of Cryptology, vol. 9, pp. 111-126, Nov. 1996
    • (1996) Journal of Cryptology , vol.9 , pp. 111-126
    • Golić, J.Dj.1
  • 16
    • 84947279371 scopus 로고    scopus 로고
    • Linear cryptanalysis of bluetooth stream cipher
    • Advances in Cryptology - EUROCRYPT 2002, L. R. Knudsen Ed., Springer-Verlag
    • Jovan Dj. Golić, Vittorio Bagini, Guglielmo Morgari, Linear Cryptanalysis of Bluetooth Stream Cipher, Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science, vol. 2332, L. R. Knudsen Ed., Springer-Verlag, pp. 238-255, 2002
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 238-255
    • Golić, J.Dj.1    Bagini, V.2    Morgari, G.3
  • 17
    • 84958740066 scopus 로고    scopus 로고
    • Correlation properties of the bluetooth combiner
    • Information Security and Cryptology - ICISC'99, JooSeok. Song Ed., Springer-Verlag
    • Miia Hermelin, Kaisa Nyberg, Correlation Properties of the Bluetooth Combiner, Information Security and Cryptology - ICISC'99, Lecture Notes in Computer Science, vol. 1787, JooSeok. Song Ed., Springer-Verlag, pp. 17-29, 2000
    • (2000) Lecture Notes in Computer Science , vol.1787 , pp. 17-29
    • Hermelin, M.1    Nyberg, K.2
  • 18
    • 84957062097 scopus 로고    scopus 로고
    • Improved fast correlation attacks on stream ciphers via convolutional codes
    • Advances in Cryptology - CRYPTO'99, M. Wiener Ed., Springer-Verlag
    • Thomas Johansson, Frederik Jönsson, Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes, Advances in Cryptology - CRYPTO'99, Lecture Notes in Computer Science, vol.1666, M. Wiener Ed., Springer-Verlag, pp. 181-197, 1999
    • (1999) Lecture Notes in Computer Science , vol.1666 , pp. 181-197
    • Johansson, T.1    Jönsson, F.2
  • 19
    • 84974625340 scopus 로고    scopus 로고
    • Fast correlation attacks through reconstruction of linear polynomials
    • Advances in Cryptology - CRYPTO 2000, M. Bellare Ed., Springer-Verlag
    • Thomas Johansson, Frederik Jönsson, Fast Correlation Attacks through Reconstruction of Linear Polynomials, Advances in Cryptology - CRYPTO 2000, Lecture Notes in Computer Science, vol.1880, M. Bellare Ed., Springer-Verlag, pp. 300-315, 2000
    • (2000) Lecture Notes in Computer Science , vol.1880 , pp. 300-315
    • Johansson, T.1    Jönsson, F.2
  • 20
    • 84935039488 scopus 로고    scopus 로고
    • BDD-based cryptanalysis of keystream generators
    • Advances in Cryptology - EUROCRYPT 2002, L. R. Knudsen Ed., Springer-Verlag
    • Matthias Krause, BDD-Based Cryptanalysis of Keystream Generators, Advances in Cryptology - EUROCRYPT 2002, Lecture Notes in Computer Science, vol. 2332, L. R. Knudsen Ed., Springer-Verlag, pp. 222-237, 2002
    • (2002) Lecture Notes in Computer Science , vol.2332 , pp. 222-237
    • Krause, M.1
  • 21
    • 84955622043 scopus 로고    scopus 로고
    • Conditional correlation attack on nonlinear filter generators
    • Advances in Cryptology - ASI-ACRYPT 1996, Kwangjo Kim and Tsutomu Matsumoto Eds., Springer-Verlag
    • Sangjin Lee, Seongtaek Chee, Sangjoon Park, Sungmo Park, Conditional Correlation Attack on Nonlinear Filter Generators, Advances in Cryptology - ASI-ACRYPT 1996, Lecture Notes in Computer Science, vol.1163, Kwangjo Kim and Tsutomu Matsumoto Eds., Springer-Verlag, pp. 360-367, 1996
    • (1996) Lecture Notes in Computer Science , vol.1163 , pp. 360-367
    • Lee, S.1    Chee, S.2    Park, S.3    Park, S.4
  • 23
    • 35048894912 scopus 로고    scopus 로고
    • Faster correlation attack on bluetooth keystream generator EO
    • Advances in Cryptology - CRYPTO 2004, M. Franklin Ed., Springer-Verlag
    • Yi Lu, Serge Vaudenay, Faster Correlation Attack on Bluetooth Keystream Generator EO, Advances in Cryptology - CRYPTO 2004, Lecture Notes in Computer Science, vol.3152, M. Franklin Ed., Springer-Verlag, pp. 407-425, 2004
    • (2004) Lecture Notes in Computer Science , vol.3152 , pp. 407-425
    • Lu, Y.1    Vaudenay, S.2
  • 24
    • 33646848015 scopus 로고    scopus 로고
    • Cryptanalysis of Bluetooth keystream generator two-level EO
    • Advances in Cryptology - ASIACRYPT 2004, P. J. Lee Ed., Springer-Verlag
    • Yi Lu, Serge Vaudenuy, Cryptanalysis of Bluetooth Keystream Generator Two-level EO, Advances in Cryptology - ASIACRYPT 2004, Lecture Notes in Computer Science, vol.3329, P. J. Lee Ed., Springer-Verlag, pp. 483-499, 2004
    • (2004) Lecture Notes in Computer Science , vol.3329 , pp. 483-499
    • Lu, Y.1    Vaudenuy, S.2
  • 25
    • 85025704284 scopus 로고
    • Linear cryptanalysis method for des cipher
    • Advances in Cryptology - EUROCRYPT'93, Springer-Verlag
    • Mitsuru Matsui, Linear Cryptanalysis Method for DES Cipher, Advances in Cryptology - EUROCRYPT'93, Lecture Notes in Computer Science, vol.765, Springer-Verlag, pp. 386-397, 1993
    • (1993) Lecture Notes in Computer Science , vol.765 , pp. 386-397
    • Matsui, M.1
  • 26
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • Nov.
    • Willi Meier, Othmar Staffelbach, Fast Correlation Attacks on Certain Stream Ciphers, Journal of Cryptology, vol. 1, pp. 159-176, Nov. 1989
    • (1989) Journal of Cryptology , vol.1 , pp. 159-176
    • Meier, W.1    Staffelbach, O.2
  • 27
    • 0026678847 scopus 로고
    • Correlation properties of combiners with memory in stream ciphers
    • Nov.
    • Willi Meier, Othmar Staffelbach, Correlation Properties of Combiners with Memory in Stream Ciphers, Journal of Cryptology, vol. 5, pp. 67-86, Nov. 1992
    • (1992) Journal of Cryptology , vol.5 , pp. 67-86
    • Meier, W.1    Staffelbach, O.2
  • 30
    • 0021786321 scopus 로고
    • Decrypting a class of stream ciphers using ciphertext only
    • Jan.
    • Thomas Siegenthaler, Decrypting a class of Stream Ciphers using Ciphertext only, IEEE Transactions on Computers, vol. C-34, pp. 81-85, Jan. 1985
    • (1985) IEEE Transactions on Computers , vol.C-34 , pp. 81-85
    • Siegenthaler, T.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.