Abstract
This paper presents a new algorithm for cryptanalytically attacking stream ciphers. There is an associated measure of security, the 2-adic span. In order for a stream cipher to be secure, its 2-adic span must be large. This attack exposes a weakness of Rueppel and Massey’s summation combiner. The algorithm, based on De Weger and Mahler’s rational approximation theory for 2-adic numbers, synthesizes a shortest feedback with carry shift register that outputs a particular key stream, given a small number of bits of the key stream. It is adaptive in that it does not need to know the number of available bits beforehand.
Author supplied keywords
Cite
CITATION STYLE
Klapper, A., & Goresky, M. (1995). Cryptanalysis based on 2-adic rational approximation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 963, pp. 262–273). Springer Verlag. https://doi.org/10.1007/3-540-44750-4_21
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.