메뉴 건너뛰기




Volumn 21, Issue 3, 1997, Pages 237-286

How to break gifford’s cipher

Author keywords

Algorithms over finite fields; Boston community information system (bcis); Correlation attack; Cryptanalysis; Cryptography; Cryptology; Filter generators; Gifford s cipher; Linear algebra over gf(2); Linear feedback shift registers (lfsrs); Matrix decompositions; Primary rational canonical form; Similar matrices; Similarity transformations; Stream ciphers

Indexed keywords


EID: 84892242375     PISSN: 01611194     EISSN: 15581586     Source Type: Journal    
DOI: 10.1080/0161-119791885931     Document Type: Article
Times cited : (1)

References (49)
  • 4
    • 85023839979 scopus 로고
    • CMSC-693 Project, Computer Science Department, University of Maryland Baltimore County
    • Cain, Thomas R. 1993. How to break Gifford’s Cipher. CMSC-693 Project, Computer Science Department, University of Maryland Baltimore County. 57.
    • (1993) How to Break Gifford’s Cipher , pp. 57
    • Cain, T.R.1
  • 5
    • 85023839979 scopus 로고
    • Technical Report TR CS-94-7, Computer Science Department, University of Maryland Baltimore County
    • Cain, Thomas, and Alan T. Sherman. 1994. How to break Gifford’s Cipher. Technical Report TR CS-94-7, Computer Science Department, University of Maryland Baltimore County. 49.
    • (1994) How to Break Gifford’s Cipher , pp. 49
    • Cain, T.1    Sherman, A.T.2
  • 6
    • 85023857074 scopus 로고
    • Second Annual ACM Conference on Computer and Communications Security. New York: ACM Press
    • Cain, Thomas, and Alan T. Sherman. 1994. How to break Gifford’s Cipher (extended abstract). In Second Annual ACM Conference on Computer and Communications Security. New York: ACM Press, 198-209.
    • (1994) How to Break Gifford’s Cipher (Extended Abstract) , pp. 198-209
    • Cain, T.1    Sherman, A.T.2
  • 8
    • 85030473541 scopus 로고
    • On a fast correlation attack on certain stream ciphers
    • 91. New York: Springer-Verlag
    • Chepyzhov, Vladimir, and Ben Smeets. 1991. On a fast correlation attack on certain stream ciphers. In Advances in Cryptology: Eurocrypt 91. New York: Springer-Verlag. 176-185.
    • (1991) Advances in Cryptology: Eurocrypt , pp. 176-185
    • Chepyzhov, V.1    Smeets, B.2
  • 12
    • 0011043342 scopus 로고
    • Divide and conquer attacks on certain classes of stream ciphers
    • Dawson, Ed, and Andrew Clark, 1994. Divide and conquer attacks on certain classes of stream ciphers. Cryptologia. 18(1): 25-40.
    • (1994) Cryptologia , vol.18 , Issue.1 , pp. 25-40
    • Dawson, E.1    Clark, A.2
  • 13
    • 0041033593 scopus 로고    scopus 로고
    • A fast correlation attack on nonlinearly feedforward filtered shift-register sequences
    • 89. New York: Springer-Verlag
    • Forre, Rejane. 1989. A fast correlation attack on nonlinearly feedforward filtered shift-register sequences. In Advances in Cryptology: Eurocrypt ’89. New York: Springer-Verlag. 586-595.
    • Advances in Cryptology: Eurocrypt , pp. 586-595
    • Forre, R.1
  • 14
    • 0000953388 scopus 로고
    • Statistical techniques for language recognition: An introduction and guide for cryptanalysts
    • Ganesan, Ravi, and Alan T. Sherman. 1993. Statistical techniques for language recognition: An introduction and guide for cryptanalysts. Cryptologia. 17(4): 321-366.
    • (1993) Cryptologia , vol.17 , Issue.4 , pp. 321-366
    • Ganesan, R.1    Sherman, A.T.2
  • 15
    • 0001298193 scopus 로고
    • Statistical techniques for language recognition: An empirical study using real and simulated English
    • Ganesan, Ravi, and Alan T. Sherman. 1994. Statistical techniques for language recognition: An empirical study using real and simulated English. Cryp-tologia. 18(4): 289-331.
    • (1994) Cryp-Tologia , vol.18 , Issue.4 , pp. 289-331
    • Ganesan, R.1    Sherman, A.T.2
  • 16
    • 0003603813 scopus 로고
    • A Guide to the Theory of NP-Completeness. San Francisco: W. H. Freeman
    • Gary, Michael R., and David S. Johnson. 1979. Computers and Intractability: A Guide to the Theory of NP-Completeness. San Francisco: W. H. Freeman.
    • (1979) Computers and Intractability
    • Gary, M.R.1    Johnson, D.S.2
  • 17
    • 85023881827 scopus 로고
    • Proceedings of the 33rd Annual Symposium on Foundations of Computer Science. New York: ACM Press
    • Giesbrecht, Mark. 1992. Fast algorithms for matrix normal forms. In Proceedings of the 33rd Annual Symposium on Foundations of Computer Science. New York: ACM Press. 121-130.
    • (1992) Fast Algorithms for Matrix Normal Forms , pp. 121-130
    • Giesbrecht, M.1
  • 19
    • 0022062271 scopus 로고
    • The application of digital broadcast communication to large scale information systems
    • Gilford, David K., John M. Lucassen, and Stephen T. Berlin. 1985. The application of digital broadcast communication to large scale information systems. IEEE Journal on Selected Areas in Communications. SAC-3(3): 457-467.
    • (1985) IEEE Journal on Selected Areas in Communications , vol.3 , Issue.3 , pp. 457-467
    • Gilford, D.K.1    Lucassen, J.M.2    Berlin, S.T.3
  • 22
    • 0025824847 scopus 로고
    • A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
    • Golic, Jovan Dj., and Miodrag J. Mihaljevic. 1991. A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance. Journal of Cryptology. 3(3): 201-212.
    • (1991) Journal of Cryptology , vol.3 , Issue.3 , pp. 201-212
    • Golic, J.D.1    Mihaljevic, M.J.2
  • 24
  • 25
  • 26
    • 0004271915 scopus 로고
    • Second edition. Englewood Cliffs: Prentice-Hall
    • Hoffman, Kenneth, and Ray Kunze. 1971. Linear Algebra. Second edition. Englewood Cliffs: Prentice-Hall.
    • (1971) Linear Algebra
    • Hoffman, K.1    Kunze, R.2
  • 27
    • 0004220560 scopus 로고
    • New York: Springer-Verlag
    • Hungerford, Thomas W. 1974. Algebra. New York: Springer-Verlag.
    • (1974) Algebra
    • Hungerford, T.W.1
  • 28
    • 0004271904 scopus 로고
    • New York: W. H. Freeman and Company
    • Jacob, Bill. 1990. Linear Algebra. New York: W. H. Freeman and Company.
    • (1990) Linear Algebra
    • Jacob, B.1
  • 29
    • 0017017134 scopus 로고
    • An analysis of the structure and complexity of nonlinear binary sequence generators
    • Key, Edwin L. 1976. An analysis of the structure and complexity of nonlinear binary sequence generators. IEEE Transactions on Information Theory. IT-22(6): 732-736.
    • (1976) IEEE Transactions on Information Theory , vol.22 , Issue.6 , pp. 732-736
    • Key, E.L.1
  • 30
    • 0028675685 scopus 로고
    • The vulnerability of geometric sequences based on fields of odd characteristic
    • Klapper, Andrew. 1994. The vulnerability of geometric sequences based on fields of odd characteristic. Journal of Cryptology. 7(1): 33-51.
    • (1994) Journal of Cryptology , vol.7 , Issue.1 , pp. 33-51
    • Klapper, A.1
  • 33
    • 85023792726 scopus 로고
    • Factoring large integers by solving Boolean equations
    • Computer Science Department, University of Maryland Baltimore County
    • Lomonaco, Samuel J. Jr. 1989. Factoring large integers by solving Boolean equations. Unpublished manuscript, Computer Science Department, University of Maryland Baltimore County.
    • (1989) Unpublished Manuscript
    • Lomonaco, S.J.J.1
  • 35
    • 0011019140 scopus 로고
    • Version ten. Mathlab Group, MIT Laboratory for Computer Science
    • Macsyma Reference Manual. Version ten. Mathlab Group, MIT Laboratory for Computer Science.
    • (1983) Macsyma Reference Manual
  • 37
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • Meier, Willi, and Othmar Stafelbach. 1989. Fast correlation attacks on certain stream ciphers. Journal of Cryptology. 1(3): 159-176.
    • (1989) Journal of Cryptology , vol.1 , Issue.3 , pp. 159-176
    • Meier, W.1    Stafelbach, O.2
  • 43
    • 0003959092 scopus 로고
    • Rueppel, Rainer A. 1992. Stream ciphers. In [47]. Chapter 2. 65-134.
    • (1992) Stream ciphers , vol.47 , Issue.2 , pp. 65-134
    • Rueppel, R.A.1
  • 44
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Shannon, Claude E. 1949. Communication theory of secrecy systems. Bell System Technical Journal. 28: 656-715.
    • (1949) Bell System Technical Journal , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 46
    • 85034624593 scopus 로고
    • Cryptanalyst’s representation of nonlinearly filtered ML-sequences. Advances in Cryptology—Eurocrypt ’85
    • Siegenthaler, T. 1985. Cryptanalyst’s representation of nonlinearly filtered ML-sequences. Advances in Cryptology—Eurocrypt ’85, Springer-Verlag. 103-110.
    • (1985) Springer-Verlag , pp. 103-110
    • Siegenthaler, T.1
  • 49
    • 0026105188 scopus 로고
    • Pseudorandom bit generators in stream-cipher cryptography
    • Zeng, Kencheng, Chung-Huang Yang, Dah-Yea Wei, and T. R. N. Rao. 1991. Pseudorandom bit generators in stream-cipher cryptography. Computer. 24(2): 8-17.
    • (1991) Computer , vol.24 , Issue.2 , pp. 8-17
    • Zeng, K.1    Yang, C.-H.2    Wei, D.-Y.3    Rao, T.R.N.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.