A fast correlation attack on LILI-128

Fredrik Jönsson, Thomas Johansson

Research output: Contribution to journalArticlepeer-review

Abstract

In this paper we demonstrate a fast correlation attack on the recently proposed stream cipher LILI-128. The attack has complexity around 2(71) bit operations assuming a received sequence of length around 2(30) bits and a precomputation phase of complexity 2(79) table lookups. This complexity is significantly lower than 2(112), which was conjectured by the inventors of LILI-128 to be a lower bound on the complexity of any attack.
Original languageEnglish
Pages (from-to)127-132
JournalInformation Processing Letters
Volume81
Issue number3
Publication statusPublished - 2002

Subject classification (UKÄ)

  • Electrical Engineering, Electronic Engineering, Information Engineering

Free keywords

  • keystream generator
  • fast correlation attacks LILI-128
  • cryptography
  • stream cipher

Fingerprint

Dive into the research topics of 'A fast correlation attack on LILI-128'. Together they form a unique fingerprint.

Cite this