Abstract
Edit distance based correlation attacks on binary keystream generators consisting of clock-controlled shift registers combined by a function with memory are introduced. Recursive algorithms for efficient computation of the proposed many-to-one string edit distances are derived for both the constrained and unconstrained irregular clocking. The distances are based on mutually correlated input and output feedforward linear transforms for regularly clocked combiners with memory. Linear transforms can also incorporate linear models of clock-controlled shift registers. In particular, linear transforms and the corresponding correlation coefficients are obtained for a special type of combiners with memory based on a time-varying memoryless function.
Preview
Unable to display preview. Download preview PDF.
References
D. Coppersmith, H. Krawczyk, and Y. Mansour, ”The shrinking generator,” Advances in Cryptology — CRYPTO '93, Lecture Notes in Computer Science, vol. 773, D. R. Stinson ed., Springer-Verlag, pp. 22–39, 1994.
J. Dj. Golić and M. J. Mihaljević, ”Minimal linear equivalent analysis of a variable-memory binary sequence generator,” IEEE Trans. Inform. Theory, vol. IT-36, pp. 190–192, Jan. 1990.
J. Dj. Golić and M. J. Mihaljević, ”A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance,” J. Cryptology, vol. 3(3), pp. 201–212, 1991.
J. Dj. Golić, ”Correlation via linear sequential circuit approximation of combiners with memory,” Advances in Cryptology — EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 113–123, 1993.
J. Dj. Golić and S. V. Petrović, ”A generalized correlation attack with a probabilistic constrained edit distance,” Advances in Cryptology — EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, R. A. Rueppel ed., Springer-Verlag, pp. 472–476, 1993.
J. Dj. Golić, ”On the security of shift register based keystream generators,” Fast Software Encryption — Cambridge '93, Lecture Notes in Computer Science, vol. 809, R. J. Anderson ed., Springer-Verlag, pp. 90–100, 1994.
J. Dj. Golić and L. O'Connor, ”Embedding and probabilistic correlation attacks on clock-controlled shift registers,” Advances in Cryptology — EUROCRYPT '94, Lecture Notes in Computer Science, vol. 950, A. De Santis ed., Springer-Verlag, pp. 230–243, 1995.
J. Dj. Golić, ”Intrinsic statistical weakness of keystream generators,” Advances in Cryptology — ASIACRYPT '94, Lecture Notes in Computer Science, vol. 917, J. Pieprzyk and R. Safavi-Naini eds., Springer-Verlag, pp. 91–103, 1995.
J. Dj. Golić, ”Correlation properties of a general binary combiner with memory,” J. Cryptology, vol. 9(2), pp. 111–126, 1996.
J. Dj. Golić, ”Linear models for keystream generators,” IEEE Trans. Comput., vol. C-45, pp. 41–49, 1996.
D. Gollmann and W. G. Chambers, ”Clock-controlled shift registers: a review,” IEEE J. Select. Areas Commun., vol. 7(4), pp. 525–533, May 1989.
M. D. MacLaren and G. Marsaglia, ”Uniform random number generators,” J. Ass. Comput. Machinery, vol. 15, pp. 83–89, 1965.
W. Meier and O. Staffelbach, ”Fast correlation attacks on certain stream ciphers,” J. Cryptology, vol. 1(3), pp. 159–176, 1989.
W. Meier and O. Staffelbach, ”Correlation properties of combiners with memory in stream ciphers,” J. Cryptology, vol. 5(1), pp. 67–86, 1992.
M. J. Mihaljević, ”An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure,” Advances in Cryptology — AUSCRYPT '92, Lecture Notes in Computer Science, vol. 718, J. Seberry and Y. Zheng eds., Springer-Verlag, pp. 349–356, 1993.
R. A. Rueppel, ”Correlation immunity and the summation generator,” Advances in Cryptology — CRYPTO '85, Lecture Notes in Computer Science, vol. 218, H. C. Williams ed., Springer-Verlag, pp. 260–272, 1986.
R. A. Rueppel, ”Stream ciphers,” in Contemporary Cryptology: The Science of Information Integrity, G. Simmons ed., pp. 65–134. New York: IEEE Press, 1991.
T. Siegenthaler, ”Correlation-immunity of nonlinear combining functions for cryptographic applications,” IEEE Trans. Inform. Theory, vol. IT-30, pp. 776–780, Sep. 1984.
T. Siegenthaler, ”Decrypting a class of stream ciphers using ciphertext only,” IEEE Trans. Comput., vol. C-34, pp. 81–85, Jan. 1985.
G. Z. Xiao and J. L. Massey, ”A spectral characterization of correlation-immune combining functions,” IEEE Trans. Inform. Theory, vol. IT-34, pp. 569–571, May 1988.
M. V. Živković, ”An algorithm for the initial state reconstruction of the clock-controlled shift register,” IEEE Trans. Inform. Theory, vol. IT-37, pp. 1488–1490, Sep. 1991.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1996 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Golić, J.D. (1996). Edit distance correlation attacks on clock-controlled combiners with memory. In: Pieprzyk, J., Seberry, J. (eds) Information Security and Privacy. ACISP 1996. Lecture Notes in Computer Science, vol 1172. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0023297
Download citation
DOI: https://doi.org/10.1007/BFb0023297
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-61991-8
Online ISBN: 978-3-540-49583-3
eBook Packages: Springer Book Archive