Abstract
Cascaded cryptographic keystream generators as proposed by Gollmann possess a cryptanalytic weakness termed “lock-in” in this article. If the initial state has been guessed correctly apart from its phase a decryption cascade can be set up in which the effects of each stage of the original cascade are unravelled in reverse order. Once the decryption cascade has “locked in” on the original cascade, the state of the latter is known, and hence its future output and its output in the remote past. This weakness is studied; its effects are readily mitigated by taking certain precautions. Lock-in may also be used constructively as a synchronization technique.
Cite
CITATION STYLE
Chambers, W. G., & Gollmann, D. (1988). Lock-in effect in cascades of clock-controlled shift-registers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 330 LNCS, pp. 331–343). Springer Verlag. https://doi.org/10.1007/3-540-45961-8_31
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.