In this paper we propose a new attack on a general model for irregular clocked keystream generators. The model consists of two feedback shift registers of lengths l1 and l2, where the first shift register produces a clock control sequence for the second. This model can be used to describe among others the shrinking generator, the step-1/step-2 generator and the stop and go generator. We prove that the maximum complexity for attacking such a model is only O(2l1). © International Association for Cryptologic Research 2004.
CITATION STYLE
Molland, H. (2004). Improved linear consistency attack on irregular clocked keystream generators. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3017, 109–126. https://doi.org/10.1007/978-3-540-25937-4_8
Mendeley helps you to discover research relevant for your work.