Advertisement

The LILI-II Keystream Generator

  • A. Clark
  • Ed Dawson
  • J. Fuller
  • J. Golić
  • H -J. Lee
  • William Millan
  • S -J. Moon
  • L. Simpson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2384)

Abstract

The LILI-II keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. LILI-II is a specific cipher from the LILI family of keystream generators, and was designed with larger internal components than previous ciphers in this class, in order to provide increased security. The design offers large period and linear complexity, is immune to currently known styles of attack, and is simple to implement in hardware or software. The cipher achieves a security level of 128 bits.

Keywords

Boolean Function Stream Cipher Linear Feedback Shift Register Pseudorandom Binary Sequence Correlation Attack 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    R. Anderson. Searching for the Optimum Correlation Attack. In Fast Software Encryption-Leuven’94, volume 1008 of Lecture Notes in Computer Science, pages 137–143. Springer-Verlag, 1995.Google Scholar
  2. 2.
    S. Babbage. A space/time tradeoff in exhaustive search attacks on stream ciphers. European Convention on Security and Detection, IEE Conference Publication No. 408, May 1995.Google Scholar
  3. 3.
    S. Babbage. Cryptanalysis of LILI-128. Available at https://cosic.esat.kuleuven.ac.be/nessie/reports/extwp3-001-2.pdf
  4. 4.
    A. Biryukov and A. Shamir. Cryptanalytic time/memory/data tradeoffs for stream ciphers. In Advances in Cryptology-ASIACRYPT 2000, volume 1976 of Lecture Notes in Computer Science, pages 1–13. Springer-Verlag, 2000.CrossRefGoogle Scholar
  5. 5.
    W.G. Chambers and D. Gollmann. Embedding attacks on step[1..D] clock-controlled generators. Electronics Letters, vol. 36 pp. 1771–1773, 2000.CrossRefGoogle Scholar
  6. 6.
    E. Dawson, A. Clark, J. Golić, W. Millan, L. Penna and L. Simpson. The LILI-128 Keystream Generator. Available at https://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions.html.
  7. 7.
    C. Ding, G. Xiao and W. Shan. The Stability Theory of Stream Ciphers. Volume 561 of Lecture Notes in Computer Science. Springer-Verlag, 1991.zbMATHGoogle Scholar
  8. 8.
    J. Dj. Golić and M. J. Mihaljević. A Generalised Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. Journal of Cryptology, vol. 3(3), pp. 201–212, 1991.MathSciNetzbMATHCrossRefGoogle Scholar
  9. 9.
    J. Dj. Golić and S. Petrović. A Generalised Correlation Attack with a Probabilistic Constrained Edit Distance. In Advances in Cryptology-EUROCRYPT’92, volume 658 of Lecture Notes in Computer Science, pages 472–476. Springer-Verlag, 1992.Google Scholar
  10. 10.
    J. Dj. Golić and L. O’Connor. Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers. In Advances in Cryptology-EUROCRYPT’94, volume 950 of Lecture Notes in Computer Science, pages 230–243. Springer-Verlag, 1994.CrossRefGoogle Scholar
  11. 11.
    J. Dj. Golić. On the Security of Nonlinear Filter Generators. In Fast Software Encryption-Cambridge’96, volume 1039 of Lecture Notes in Computer Science, pages 173–188. Springer-Verlag, 1996.Google Scholar
  12. 12.
    J. Dj. Golić. Cryptanalysis of Alleged A5 stream cipher. In Advances in Cryptology-EUROCRYPT’97, volume 1233 of Lecture Notes in Computer Science, pages 239–255. Springer-Verlag, 1997.Google Scholar
  13. 13.
    F. Jönsson and T. Johansson A Fast Correlation Attack on LILI-128. http://www.it.lth.se/thomas/papers/paper140.ps
  14. 14.
    H-J. Lee and S-J. Moon Parallel Stream Cipher for Secure High-Speed Communications. Signal Processing, vol. 82, no. 2, pp. 137–143, 2002.CrossRefGoogle Scholar
  15. 15.
    J. Massey. Shift-Register Synthesis and BCH Decoding. IEEE Trans. Inform. Theory, IT-15:122–127, January 1969.Google Scholar
  16. 16.
    W. Meier and O. Staffelbach. Fast Correlation Attacks on Certain Stream Ciphers. Journal of Cryptology, vol. 1(3), pp. 159–167, 1989.zbMATHCrossRefMathSciNetGoogle Scholar
  17. 17.
    R. Rueppel. Analysis and design of stream ciphers. Springer-Verlag, Berlin, 1986.zbMATHGoogle Scholar
  18. 18.
    M. Salmasizadeh, L. Simpson, J. Dj. Golić and E. Dawson. Fast Correlation Attacks and Multiple Linear Approximations. In Information Security and Privacy-Nepean’ 97, volume 1270 of Lecture Notes in Computer Science, pages 228–239. Springer-Verlag, 1997.CrossRefGoogle Scholar
  19. 19.
    T. Siegenthaler. Decrypting a Class of Stream Ciphers Using Ciphertext Only. IEEE Trans. Computers, vol. C-34(1), pp. 81–85, 1985.CrossRefGoogle Scholar
  20. 20.
    L. Simpson, J. Dj. Golić and E. Dawson. A Probabilistic Correlation Attack on the Shrinking Generator. In Information Security and Privacy-Brisbane’ 98, volume 1438 of Lecture Notes in Computer Science, pages 147–158. Springer-Verlag, 1998.CrossRefGoogle Scholar
  21. 21.
    L. Simpson, E. Dawson, J. Dj. Golić and W. Millan. LILI Keystream Generator. Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptology-SAC’2000, volume 2012 of Lecture Notes in Computer Science, pages 248–261, Springer-Verlag, 2000.Google Scholar
  22. 22.
    K. C. Zeng, C. H. Yang and T. R. N. Rao. On the Linear Consistency Test (LCT) in Cryptanalysis with Applications. In Advances in Cryptology-CRYPTO’89, volume 434 of Lecture Notes in Computer Science, pages 164–174. Springer-Verlag, 1990.Google Scholar
  23. 23.
    M. Živković. An Algorithm for the Initial State Reconstruction of the Clock-Controlled Shift Register. IEEE Trans. Inform. Theory, vol. IT-37, pp. 1488–1490, Sept. 1991.Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  • A. Clark
    • 1
  • Ed Dawson
    • 1
  • J. Fuller
    • 1
  • J. Golić
    • 2
  • H -J. Lee
    • 3
  • William Millan
    • 1
  • S -J. Moon
    • 4
  • L. Simpson
    • 1
  1. 1.Information Security Research CentreQueensland University of TechnologyBrisbaneAustralia
  2. 2.GEMPLUSRome CryptoDesign Center, Technology R&DRomeItaly
  3. 3.School of Internet EngineeringDongseo UniversityPusanKorea
  4. 4.School of Electronic and Electrical EngineeringKyungpook National UniversityTaeguKorea

Personalised recommendations