메뉴 건너뛰기




Volumn 1, Issue 1-2, 2006, Pages 95-102

Three ways to mount distinguishing attacks on irregularly clocked stream ciphers

Author keywords

cryptanalysis; distinguishing attacks; irregularly clocked LFSRs; keystream generators; low weight linear relations; pseudo random number generator; step one step two generator; stream ciphers; vector based attacks

Indexed keywords


EID: 72449209394     PISSN: 17478405     EISSN: 17478413     Source Type: Journal    
DOI: 10.1504/ijsn.2006.010826     Document Type: Article
Times cited : (12)

References (22)
  • 1
    • 84948963512 scopus 로고    scopus 로고
    • Improved fast correlation attacks using parity-check equations of weight 4 and 5
    • B. Preneel (Ed) Lecture Notes in Computer Science, Springer-Verlag
    • Canteaut, A. and Trabbia, M. (2000) ‘Improved fast correlation attacks using parity-check equations of weight 4 and 5’, in B. Preneel (Ed). Advances in Cryptology – EUROCRYPT 2000, Vol. 1807, Lecture Notes in Computer Science, Springer-Verlag, pp.573–588.
    • (2000) Advances in Cryptology – EUROCRYPT 2000 , vol.1807 , pp. 573-588
    • Canteaut, A.1    Trabbia, M.2
  • 2
    • 84969367308 scopus 로고    scopus 로고
    • A simple algorithm for fast correlation attacks on stream ciphers
    • B. Schneier (Ed) Lecture Notes in Computer Science, Springer-Verlag
    • Chepyzhov, V., Johansson, T. and Smeets, B. (2000) ‘A simple algorithm for fast correlation attacks on stream ciphers’, in B. Schneier (Ed). Fast Software Encryption 2000, Vol. 1978, Lecture Notes in Computer Science, Springer-Verlag, pp.181–195.
    • (2000) Fast Software Encryption 2000 , vol.1978 , pp. 181-195
    • Chepyzhov, V.1    Johansson, T.2    Smeets, B.3
  • 3
    • 84937397479 scopus 로고    scopus 로고
    • Cryptanalysis of stream ciphers with linear masking
    • M. Yung (Ed) Lecture Notes in Computer Science, Springer-Verlag
    • Coppersmith, D., Halevi, S. and Jutla, C. (2002) ‘Cryptanalysis of stream ciphers with linear masking’, in M. Yung (Ed). Advances in Cryptology – CRYPTO 2002, Vol. 2442, Lecture Notes in Computer Science, Springer-Verlag, pp.515–532.
    • (2002) Advances in Cryptology – CRYPTO 2002 , vol.2442 , pp. 515-532
    • Coppersmith, D.1    Halevi, S.2    Jutla, C.3
  • 4
    • 35248849880 scopus 로고    scopus 로고
    • Fast algebraic attacks on stream ciphers with linear feedback
    • D. Boneh (Ed) Lecture Notes in Computer Science, Springer-Verlag
    • Courtois, N. (2003) ‘Fast algebraic attacks on stream ciphers with linear feedback’, in D. Boneh (Ed). Advances in Cryptology – CRYPTO 2003, Vol. 2729, Lecture Notes in Computer Science, Springer-Verlag, pp.176–194.
    • (2003) Advances in Cryptology – CRYPTO 2003 , vol.2729 , pp. 176-194
    • Courtois, N.1
  • 5
    • 35248820612 scopus 로고    scopus 로고
    • Algebraic attacks on stream ciphers with linear feedback
    • E. Biham (Ed) Lecture Notes in Computer Science, Springer-Verlag
    • Courtois, N. and Meier, W. (2003) ‘Algebraic attacks on stream ciphers with linear feedback’, in E. Biham (Ed). Advances in Cryptology – EUROCRYPT 2003, Vol. 2656, Lecture Notes in Computer Science, Springer-Verlag, pp.345–359.
    • (2003) Advances in Cryptology – EUROCRYPT 2003 , vol.2656 , pp. 345-359
    • Courtois, N.1    Meier, W.2
  • 8
    • 84949479756 scopus 로고    scopus 로고
    • Distinguishing attacks on SOBER-t16 and SOBER-t32
    • J. Daemen and V. Rijmen (Eds) Lecture Notes in Computer Science, Springer-Verlag
    • Ekdahl, P. and Johansson, T. (2002) ‘Distinguishing attacks on SOBER-t16 and SOBER-t32’, in J. Daemen and V. Rijmen (Eds). Fast Software Encryption 2002, Vol. 2365, Lecture Notes in Computer Science, Springer-Verlag, pp.210–224.
    • (2002) Fast Software Encryption 2002 , vol.2365 , pp. 210-224
    • Ekdahl, P.1    Johansson, T.2
  • 9
    • 26444575925 scopus 로고    scopus 로고
    • A new distinguisher for clock controlled stream ciphers
    • Fast Software Encryption 2005, Springer-Verlag
    • Englund, H. and Johansson, T. (2005a) ‘A new distinguisher for clock controlled stream ciphers’, Fast Software Encryption 2005, Lecture Notes in Computer Science, Springer-Verlag.
    • (2005) Lecture Notes in Computer Science
    • Englund, H.1    Johansson, T.2
  • 10
    • 24144456208 scopus 로고    scopus 로고
    • A new simple technique to attack filter generators and related ciphers
    • H. Handschuh and A. Hasan (Eds) Lecture Notes in Computer Science, Springer-Verlag
    • Englund, H. and Johansson, T. (2005b) ‘A new simple technique to attack filter generators and related ciphers’, in H. Handschuh and A. Hasan (Eds). Selected Areas in Cryptography – SAC 2004, Vol. 3357, Lecture Notes in Computer Science, Springer-Verlag, pp.39–53.
    • (2005) Selected Areas in Cryptography – SAC 2004 , vol.3357 , pp. 39-53
    • Englund, H.1    Johansson, T.2
  • 11
    • 0030261891 scopus 로고    scopus 로고
    • Computation of low-weight parity-check polynomials
    • Golić, J. (1996) ‘Computation of low-weight parity-check polynomials’, Electronic Letters, Vol. 32, No. 21, pp.1981–1982.
    • (1996) Electronic Letters , vol.32 , Issue.21 , pp. 1981-1982
    • Golić, J.1
  • 13
    • 84957062097 scopus 로고    scopus 로고
    • Fast correlation attacks based on turbo code techniques
    • M.Wiener (Ed) Lecture Notes in Computer Science, Springer-Verlag
    • Johansson, T. and Jönsson, F. (1999a) ‘Fast correlation attacks based on turbo code techniques’, in M.Wiener (Ed). Advances in Cryptology – CRYPTO’99, Vol. 1666, Lecture Notes in Computer Science, Springer-Verlag, pp.181–197.
    • (1999) Advances in Cryptology – CRYPTO’99 , vol.1666 , pp. 181-197
    • Johansson, T.1    Jönsson, F.2
  • 14
    • 84957702423 scopus 로고    scopus 로고
    • Improved fast correlation attacks on stream ciphers via convolutional codes
    • J. Stern (Ed) Lecture Notes in Computer Science Springer-Verlag
    • Johansson, T. and Jönsson, F. (1999b) ‘Improved fast correlation attacks on stream ciphers via convolutional codes’, in J. Stern (Ed). Advances in Cryptology – EUROCRYPT’99, Vol. 1592, Lecture Notes in Computer Science, Springer-Verlag, pp.347–362.
    • (1999) Advances in Cryptology – EUROCRYPT’99 , vol.1592 , pp. 347-362
    • Johansson, T.1    Jönsson, F.2
  • 15
    • 84974625340 scopus 로고    scopus 로고
    • Fast correlation attacks through reconstruction of linear polynomials
    • M. Bellare (Ed) Lecture Notes in Computer Science, Springer-Verlag
    • Johansson, T. and Jönsson, F. (2000) ‘Fast correlation attacks through reconstruction of linear polynomials’, in M. Bellare (Ed). Advances in Cryptology – CRYPTO 2000, Vol. 1880, Lecture Notes in Computer Science, Springer-Verlag, pp.300–315.
    • (2000) Advances in Cryptology – CRYPTO 2000 , vol.1880 , pp. 300-315
    • Johansson, T.1    Jönsson, F.2
  • 17
    • 35248813838 scopus 로고    scopus 로고
    • On the optimality of linear, differential and sequential distinguishers
    • Lecture Notes in Computer Science, Springer-Verlag
    • Junod, P. (2003) ‘On the optimality of linear, differential and sequential distinguishers’, Advances in Cryptology – EUROCRYPT 2003, Vol. 2656, Lecture Notes in Computer Science, Springer-Verlag, pp.17–32.
    • (2003) Advances in Cryptology – EUROCRYPT 2003 , vol.2656 , pp. 17-32
    • Junod, P.1
  • 18
    • 33646803496 scopus 로고    scopus 로고
    • Fast computation of large distributions and its cryptographic applications
    • Lecture Notes in Computer Science, Springer-Verlag
    • Maximov, A. and Johansson, T. (2005) ‘Fast computation of large distributions and its cryptographic applications’, Advances in Cryptology – ASIACRYPT 2005, Vol. 3788, Lecture Notes in Computer Science, Springer-Verlag, pp.313–332.
    • (2005) Advances in Cryptology – ASIACRYPT 2005 , vol.3788 , pp. 313-332
    • Maximov, A.1    Johansson, T.2
  • 19
    • 33745650569 scopus 로고
    • Fast correlation attacks on stream ciphers
    • C. Günter (Ed) Lecture Notes in Computer Science, Springer-Verlag
    • Meier, W. and Staffelbach, O. (1988) ‘Fast correlation attacks on stream ciphers’, in C. Günter (Ed). Advances in Cryptology – EUROCRYPT’88, Vol. 330, Lecture Notes in Computer Science, Springer-Verlag, pp.301–316.
    • (1988) Advances in Cryptology – EUROCRYPT’88 , vol.330 , pp. 301-316
    • Meier, W.1    Staffelbach, O.2
  • 20
    • 0021489155 scopus 로고
    • Correlation-immunity of non-linear combining functions for cryptographic applications
    • Siegenthaler, T. (1984) ‘Correlation-immunity of non-linear combining functions for cryptographic applications’, IEEE Transactions on Information Theory, Vol. 30, pp.776–780.
    • (1984) IEEE Transactions on Information Theory , vol.30 , pp. 776-780
    • Siegenthaler, T.1
  • 21
    • 84937428040 scopus 로고    scopus 로고
    • A generalized birthday problem
    • M. Yung (Ed) Lecture Notes in Computer Science, Springer-Verlag
    • Wagner, D. (2002) ‘A generalized birthday problem’, in M. Yung (Ed). Advances in Cryptology – CRYPTO 2002, Vol. 2442, Lecture Notes in Computer Science, Springer-Verlag, pp.288–303.
    • (2002) Advances in Cryptology – CRYPTO 2002 , vol.2442 , pp. 288-303
    • Wagner, D.1
  • 22
    • 33746729581 scopus 로고    scopus 로고
    • A distinguishing attack of SNOW 2.0 with linear masking method
    • of Lecture Notes in Computer Science, Springer-Verlag
    • Watanabe, D., Biryukov, A. and Canniere, C.D. (2003) ‘A distinguishing attack of SNOW 2.0 with linear masking method’, in Selected Areas in Cryptography—SAC 2003, Vol. 3006 of Lecture Notes in Computer Science, Springer-Verlag, pp.222–233.
    • (2003) Selected Areas in Cryptography—SAC 2003 , vol.3006 , pp. 222-233
    • Watanabe, D.1    Biryukov, A.2    Canniere, C.D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.