On a fast correlation attack on certain streaxn ciphers

Vladimir Chepyzhov, Ben Smeets

Research output: Chapter in Book/Report/Conference proceedingPaper in conference proceedingpeer-review

Abstract

In this paper we present a new algorithm for the recovery of the initial state of a linear feedback shift register when a noisy output sequence is given. Our work is focussed on the investigation of the asymptotical behaviour of the recovery process rather than on the construction of an optimal recovery procedure. Our results show the importance of low-weight checks and show also that the complexity of the recovery problem grows less than exponentially with the length of the shift register, even if the number of taps grows linearly with the register length. Our procedure works for shift register with arbitrary feedback polynomial.

Original languageEnglish
Title of host publicationAdvances in Cryptology—EUROCRYPT 1991
Subtitle of host publicationWorkshop on the Theory and Application of Cryptographic Techniques, Proceedings
EditorsDonald W. Davies
PublisherSpringer
Pages176-185
Number of pages10
ISBN (Electronic)9783540464167
ISBN (Print)9783540546207
DOIs
Publication statusPublished - 1991
EventWorkshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1991 - Brighton, United Kingdom
Duration: 1991 Apr 81991 Apr 11

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume547 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

ConferenceWorkshop on the Theory and Application of Cryptographic Techniques, EUROCRYPT 1991
Country/TerritoryUnited Kingdom
CityBrighton
Period1991/04/081991/04/11

Bibliographical note

Funding Information:
The first author would like to thank the USSR Academy of Sciences, the Royal Swedish Academy of Sciences, and the Department of Information Theory in Lund for their support and making this work possible.

Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 1991.

Subject classification (UKÄ)

  • Computer Science
  • Control Engineering

Fingerprint

Dive into the research topics of 'On a fast correlation attack on certain streaxn ciphers'. Together they form a unique fingerprint.

Cite this