Mutually clock-controlled feedback shift registers provide resistance to algebraic attacks

5Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Algebraic attacks have been applied to several types of clock-controlled stream ciphers. However, to date there are no such attacks in the literature on mutually clock-controlled ciphers. In this paper, we present a preliminary step in this direction by giving the first algebraic analysis of mutually clock-controlled feedback shift register stream ciphers: the bilateral stop-and-go generator, A5/1, Alpha 1 and the MICKEY cipher. We show that, if there are no regularly clocked shift registers included in the system, mutually clock-controlled feedback shift register ciphers appear to be highly resistant to algebraic attacks. As a demonstration of the weakness inherent in the presence of a regularly clocked shift register, we present a simple algebraic attack on Alpha 1 based on only 29 keystream bits. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Al Hinai, S., Batten, L. M., & Colbert, B. (2008). Mutually clock-controlled feedback shift registers provide resistance to algebraic attacks. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4990 LNCS, pp. 201–215). https://doi.org/10.1007/978-3-540-79499-8_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free