Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first described attacks on ciphers using such a resync mechanism. In this paper, we extend their attacks in several ways by combining the standard attack with cryptanalytic techniques such as algebraic attacks and linear cryptanalysis. Our results show that using linear resync mechanisms should be avoided, and provide lower bounds for the nonlinearity required from a secure resync mechanism. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Armknecht, F., Lano, J., & Preneel, B. (2005). Extending the resynchronization attack. In Lecture Notes in Computer Science (Vol. 3357, pp. 19–38). https://doi.org/10.1007/978-3-540-30564-4_2
Mendeley helps you to discover research relevant for your work.