Extending the resynchronization attack

14Citations
Citations of this article
28Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first described attacks on ciphers using such a resync mechanism. In this paper, we extend their attacks in several ways by combining the standard attack with cryptanalytic techniques such as algebraic attacks and linear cryptanalysis. Our results show that using linear resync mechanisms should be avoided, and provide lower bounds for the nonlinearity required from a secure resync mechanism. © Springer-Verlag Berlin Heidelberg 2005.

Cite

CITATION STYLE

APA

Armknecht, F., Lano, J., & Preneel, B. (2005). Extending the resynchronization attack. In Lecture Notes in Computer Science (Vol. 3357, pp. 19–38). https://doi.org/10.1007/978-3-540-30564-4_2

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free