Lock-in effect in cascades of clock-controlled shift-registers

23Citations
Citations of this article
35Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cascaded cryptographic keystream generators as proposed by Gollmann possess a cryptanalytic weakness termed “lock-in” in this article. If the initial state has been guessed correctly apart from its phase a decryption cascade can be set up in which the effects of each stage of the original cascade are unravelled in reverse order. Once the decryption cascade has “locked in” on the original cascade, the state of the latter is known, and hence its future output and its output in the remote past. This weakness is studied; its effects are readily mitigated by taking certain precautions. Lock-in may also be used constructively as a synchronization technique.

Cite

CITATION STYLE

APA

Chambers, W. G., & Gollmann, D. (1988). Lock-in effect in cascades of clock-controlled shift-registers. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 330 LNCS, pp. 331–343). Springer Verlag. https://doi.org/10.1007/3-540-45961-8_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free