Abstract
In some applications for synchronous stream ciphers, the risk of loss of synchronization cannot be eliminated completely. In these cases frequent synchronization or resynchronization upon request may be necessary. In the paper it is shown that this can lead to significant deterioration of the cryptographic security. A powerful general attack on nonlinearly filtered linear (over ℤ2) systems is presented. This attack is further refined to efficiently cryptanalyze a linear system with a multiplexer as output function.
Chapter PDF
References
R. A. Rueppel, ‘Stream Ciphers’, in Contemporary Cryptology, Gustavus J. Simmons Ed. IEEE Press, New York.
‘Specification of the systems of the MAC/packet family’. EBU Technical Document 3258-E, Oct 1986.
J. Daemen, R. Govaerts, J. Vandewalle, Cryptanalysis of MUX-LFSR Based Scramblers, in Proceedings of SPRC’ 93, 15–16 February, Roma. (to appear)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1994 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Daemen, J., Govaerts, R., Vandewalle, J. (1994). Resynchronization Weaknesses in Synchronous Stream Ciphers. In: Helleseth, T. (eds) Advances in Cryptology — EUROCRYPT ’93. EUROCRYPT 1993. Lecture Notes in Computer Science, vol 765. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48285-7_14
Download citation
DOI: https://doi.org/10.1007/3-540-48285-7_14
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-57600-6
Online ISBN: 978-3-540-48285-7
eBook Packages: Springer Book Archive