Cryptanalysis based on 2-adic rational approximation

74Citations
Citations of this article
42Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper presents a new algorithm for cryptanalytically attacking stream ciphers. There is an associated measure of security, the 2-adic span. In order for a stream cipher to be secure, its 2-adic span must be large. This attack exposes a weakness of Rueppel and Massey’s summation combiner. The algorithm, based on De Weger and Mahler’s rational approximation theory for 2-adic numbers, synthesizes a shortest feedback with carry shift register that outputs a particular key stream, given a small number of bits of the key stream. It is adaptive in that it does not need to know the number of available bits beforehand.

Cite

CITATION STYLE

APA

Klapper, A., & Goresky, M. (1995). Cryptanalysis based on 2-adic rational approximation. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 963, pp. 262–273). Springer Verlag. https://doi.org/10.1007/3-540-44750-4_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free