Skip to main content

On the Efficiency of the Clock Control Guessing Attack

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2587))

Abstract

Many bitstream generators are based on linear feedback shift registers. A widespread technique for the cryptanalysis of those generators is the linear consistency test (LCT). In this paper, we consider an application of the LCT in cryptanalysis of clock-controlled bitstream generators, called clock control guessing. We give a general and very simple method for estimating the efficiency of clock control guessing, yielding an upper bound on the effective key length of a whole group of bitstream generators. Finally, we apply the technique against a number of clock-controlled generators, such as the A5/1, alternating step generator, step1-step2 generator, cascade generator, and others.

This work was partially supported by the LGF Baden-W urttemberg.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. S. Babbage. Cryptanalysis of LILI-128. Technical report, Nessie project, 2001. http://www.cosic.esat.kuleuven.ac.be/nessie/reports/. 211

  2. T. Beth and F. Piper. The stop-and-go generator. In T. Beth, N. Cot, and I. Ingemarsson, editors, Advances in Cryptology-Eurocrypt’ 84, volume 209 of LNCS, pages 88–92. Springer, 1985. 209

    Google Scholar 

  3. M. Briceno, I. Goldberg, and D. Wagner. A pedagogical implementation of A5/1. http://www.scard.org/gsm/a51.html. 207

  4. D. Coppersmith, H. Krawczyk, and Y. Mansour. The shrinking generator. In D.R. Stinson, editor, Advances in Cryptology-Eurocrypt’ 93, volume 773 of LNCS, pages 22–39, Berlin, 1993. Springer. 202, 210

    Chapter  Google Scholar 

  5. E. Dawson and A. Clark. Divide and conquer attacks on certain classes of stream ciphers. Cryptologia, 18(4):25–40, 1994. 202

    Article  MATH  Google Scholar 

  6. J.D. Golić. Cryptanalysis of alleged A5 stream cipher. In W. Fumy, editor, Advances in Cryptology-Eurocrypt’ 97, volume 1233 of LNCS, pages 239–255, Berlin, 1997. Springer. 203, 207

    Google Scholar 

  7. J.D. Golić. Cryptanalysis of three mutually clock-controlled stop/go shift registers. IEEE Trans. Inf. Theory, 46(3):1081–1090, May 2000. 201, 207, 208

    Article  MATH  Google Scholar 

  8. D. Gollmann and W. Chambers. Clock-controlled shift registers: A review. IEEE J. Selected Areas Comm., 7(4):525–533, May 1989. 210

    Article  Google Scholar 

  9. S. Golomb. Shift Register Sequences. Aegean Park Press, Laguna Hills (CA), revised edition, 1982. 200

    Google Scholar 

  10. C. Günther. Alternating step generators controlled by de Bruijn sequences. In D. Chaum and W. Price, editors, Advances in Cryptology-Eurocrypt’ 87, volume 304 of LNCS, pages 88–92. Springer, 1988. 202

    Google Scholar 

  11. F. Jönsson and T. Johansson. A fast correlation attack on LILI-128. Technical report, Lund University, Sweden, 2001. 211

    Google Scholar 

  12. M. Krause. BDD-based cryptanalysis of keystream generators. In L.T Knudsen, editor, Advances in Cryptology-Eurocrypt’ 02, LNCS. Springer, 2002. 205

    Google Scholar 

  13. W. Meier and O. Staffelbach. The self-shrinking generator. In A. De Santis, editor, Advances in Cryptology-Eurocrypt’ 94, volume 950 of LNCS, pages 205–214, Berlin, 1995. Springer. 211

    Chapter  Google Scholar 

  14. T. Pornin and J. Stern. Software-hardware trade-offs: Application to A5/1 cryptanalysis. In Ç. KoÇ and C. Paar, editors, Proc. CHES 2000, volume 1965 of LNCS, pages 318–327. Springer, 2000. 201, 207

    Google Scholar 

  15. R. Rueppel. Stream ciphers. In G. Simmons, editor, Contemporary Cryptology-The Science of Information Integrity, pages 65–134. IEEE Press, 1992. 201

    Google Scholar 

  16. M.-J. Saarinen. A time-memory tradeoff attack against LILI-128. In J. Daemen and V. Rijmen, editors, Proc. FSE 2002, volume 2365 of LNCS, pages 231–236. Springer, 2002. 211

    Google Scholar 

  17. L. Simpson, E. Dawson, J. Golić, and W. Millan. LILI keystream generator. In D. Stinson and S. Tavares, editors, Proc. SAC 2000, volume 2012 of LNCS, pages 248–261. Springer, 2001. 211

    Google Scholar 

  18. K. Zeng, C. Yang, and Y. Rao. On the linear consistency test (LCT) in cryptanalysis with applications. In G. Brassard, editor, Advances in Cryptology-Crypto’ 89, volume 435 of LNCS, pages 164–174. Springer, 1990. 201, 202, 203

    Google Scholar 

  19. E. Zenner. Kryptographische Protokolle im GSM-Standard-Beschreibung und Kryptanalyse. Master’s thesis, University of Mannheim, 1999. 201, 207

    Google Scholar 

  20. E. Zenner, M. Krause, and S. Lucks. Improved cryptanalysis of the self-shrinking generator. In V. Varadharajan and Y. Mu, editors, Proc. ACISP’ 01, volume 2119 of LNCS, pages 21–35. Springer, 2001. 203, 211

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zenner, E. (2003). On the Efficiency of the Clock Control Guessing Attack. In: Lee, P.J., Lim, C.H. (eds) Information Security and Cryptology — ICISC 2002. ICISC 2002. Lecture Notes in Computer Science, vol 2587. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36552-4_14

Download citation

  • DOI: https://doi.org/10.1007/3-540-36552-4_14

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00716-6

  • Online ISBN: 978-3-540-36552-5

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics