Attacking the filter generator by finding zero inputs of the filtering function

1Citations
Citations of this article
21Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The filter generator is an important building block in many stream ciphers. We present here an attack that recovers the initial state of the hidden LFSR by detecting the positions where the inputs of the filtering function are equal to zero. This attack requires the precomputation of low weight multiples of the LFSR generating polynomial. By a careful analysis, we show that the attack complexity is among the best known and work for almost all cryptographic filtering functions. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Didier, F. (2007). Attacking the filter generator by finding zero inputs of the filtering function. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4859 LNCS, pp. 404–413). Springer Verlag. https://doi.org/10.1007/978-3-540-77026-8_32

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free