The LILI-II Keystream Generator
The LILI-II keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. LILI-II is a specific cipher from the LILI family of keystream generators, and was designed with larger internal components than previous ciphers in this class, in order to provide increased security. The design offers large period and linear complexity, is immune to currently known styles of attack, and is simple to implement in hardware or software. The cipher achieves a security level of 128 bits.
KeywordsBoolean Function Stream Cipher Linear Feedback Shift Register Pseudorandom Binary Sequence Correlation Attack
Unable to display preview. Download preview PDF.
- 1.R. Anderson. Searching for the Optimum Correlation Attack. In Fast Software Encryption-Leuven’94, volume 1008 of Lecture Notes in Computer Science, pages 137–143. Springer-Verlag, 1995.Google Scholar
- 2.S. Babbage. A space/time tradeoff in exhaustive search attacks on stream ciphers. European Convention on Security and Detection, IEE Conference Publication No. 408, May 1995.Google Scholar
- 3.S. Babbage. Cryptanalysis of LILI-128. Available at https://cosic.esat.kuleuven.ac.be/nessie/reports/extwp3-001-2.pdf
- 6.E. Dawson, A. Clark, J. Golić, W. Millan, L. Penna and L. Simpson. The LILI-128 Keystream Generator. Available at https://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions.html.
- 9.J. Dj. Golić and S. Petrović. A Generalised Correlation Attack with a Probabilistic Constrained Edit Distance. In Advances in Cryptology-EUROCRYPT’92, volume 658 of Lecture Notes in Computer Science, pages 472–476. Springer-Verlag, 1992.Google Scholar
- 11.J. Dj. Golić. On the Security of Nonlinear Filter Generators. In Fast Software Encryption-Cambridge’96, volume 1039 of Lecture Notes in Computer Science, pages 173–188. Springer-Verlag, 1996.Google Scholar
- 12.J. Dj. Golić. Cryptanalysis of Alleged A5 stream cipher. In Advances in Cryptology-EUROCRYPT’97, volume 1233 of Lecture Notes in Computer Science, pages 239–255. Springer-Verlag, 1997.Google Scholar
- 13.F. Jönsson and T. Johansson A Fast Correlation Attack on LILI-128. http://www.it.lth.se/thomas/papers/paper140.ps
- 15.J. Massey. Shift-Register Synthesis and BCH Decoding. IEEE Trans. Inform. Theory, IT-15:122–127, January 1969.Google Scholar
- 21.L. Simpson, E. Dawson, J. Dj. Golić and W. Millan. LILI Keystream Generator. Proceedings of the Seventh Annual Workshop on Selected Areas in Cryptology-SAC’2000, volume 2012 of Lecture Notes in Computer Science, pages 248–261, Springer-Verlag, 2000.Google Scholar
- 22.K. C. Zeng, C. H. Yang and T. R. N. Rao. On the Linear Consistency Test (LCT) in Cryptanalysis with Applications. In Advances in Cryptology-CRYPTO’89, volume 434 of Lecture Notes in Computer Science, pages 164–174. Springer-Verlag, 1990.Google Scholar
- 23.M. Živković. An Algorithm for the Initial State Reconstruction of the Clock-Controlled Shift Register. IEEE Trans. Inform. Theory, vol. IT-37, pp. 1488–1490, Sept. 1991.Google Scholar