New guess-and-determine attack on the self-shrinking generator

24Citations
Citations of this article
30Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We propose a new type of guess-and-determine attack on the self-shrinking generator (SSG). The inherent flexibility of the new attack enables us to deal with different attack conditions and requirements smoothly. For the SSG with a length L LFSR of arbitrary form, our attack can reliably restore the initial state with time complexity O(20.556L), memory complexity O(L 2) from O(20.161L)-bit keystream for L ≥ 100 and time complexity O(20.571L), memory complexity O(L2) from O(20.194L)-bit keystream for L< 100. Therefore, our attack is better than all the previously known attacks on the SSG and especially, it compares favorably with the time/memory/data tradeoff attack which typically has time complexity O(20.5L), memory complexity O(20.5L) and data complexity O(20.25L)-bit keystream after a pre-computation phase of complexity O(20.75L). It is well-known that one of the open research problems in stream ciphers specified by the European STORK (Strategic Roadmap for Crypto) project is to find an attack on the self-shrinking generator with complexity lower than that of a generic time/memory/data tradeoff attack. Our result is the best answer to this problem known so far. © 2006 Springer-Verlag.

Cite

CITATION STYLE

APA

Zhang, B., & Feng, D. (2006). New guess-and-determine attack on the self-shrinking generator. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4284 LNCS, pp. 54–68). https://doi.org/10.1007/11935230_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free