A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher
@inproceedings{Chen2003ACD, title={A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher}, author={Kevin Chen and Leonie Ruth Simpson and Matt Henricksen and William Millan and Ed Dawson}, booktitle={ICISC}, year={2003} }
Alpha1 is a stream cipher with a key size of 128 bits. It was proposed as a replacement algorithm for the stream cipher A5 to supply confidentiality over mobile communication systems. Alpha1 consists of four binary linear feedback shift registers. Previous attacks on Alpha1 only recover the initial state of the shortest register. In this paper we present a complete divide and conquer attack, starting with an improved attack on the shortest register, and continuing the attack to recover the…
Figures and Tables from this paper
4 Citations
Algebraic Attacks on Clock-Controlled Stream Ciphers
- Computer Science, MathematicsACISP
- 2006
An algebraic attack approach to a family of irregularly clock-controlled bit-based linear feedback shift register systems is presented and it is demonstrated that the degree of a functional relationship between the registers can be bounded by two.
Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks
- Computer Science, MathematicsInscrypt
- 2007
It is shown that, if there are no regularly clocked shift registers included in the system, mutually clock-controlled feedback shift register ciphers appear to be highly resistant to algebraic attacks.
Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers
- Computer Science, MathematicsIEICE Trans. Fundam. Electron. Commun. Comput. Sci.
- 2005
This paper discusses GD attacks on clock-controlled stream ciphers, which use irregular clocking for a non-linear function, and proposes and calculates the process complexity of these attacks.
Cryptanalysis Techniques for Stream Cipher: A Survey
- Computer Science, Mathematics
- 2012
This study aims to provide a comprehensive survey that summarizes the existing cryptanalysis techniques for stream ciphers and will facilitate the security analysis of the existing stream cipher designs and provide an opportunity to understand the requirements for developing a secure and efficient stream cipher design.
References
SHOWING 1-10 OF 131 REFERENCES
DECIM, a new stream cipher for hardware applications
- Computer Science
- 2005
The design of the cipher is based on both a nonlinear filter LFSR and an irregular decimation mechanism recently introduced and called the ABSG and the design goal is to produce a stream cipher with a compact hardware implementation and operating at high rates.
Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers
- Computer Science, MathematicsINDOCRYPT
- 2004
It is shown that a new class of self-synchronizing stream ciphers combining LFSR and FCSR architectures is extremely vulnerable to chosen ciphertext attack.
Divide and Conquer Attack on ABC Stream Cipher
- Computer Science, Mathematics
- 2005
The whole initial state of ABC could be found in time complexity of 2 simple word operations using a few output words, and the total time and data complexity of the attack for breaking the whole cipher are 2simple word operations and 10×2 words respectively.
Weaknesses of COSvd (2, 128) Stream Cipher
- Computer Science, MathematicsICISC
- 2005
The COSvd (2,128) cipher was proposed at the ECRYPT SASC'2004 workshop by Filiol et. al to strengthen the past COS (2,128) stream cipher. It uses clock-controlled non-linear feedback registers…
The WG Stream Cipher
- Computer Science, Mathematics
- 2005
A new synchronous stream cipher, called WG cipher, based on WG (Welch-Gong) transformations, designed to produce keystream with guaranteed randomness properties, which is resistant to Time/Memory/Data tradeoff attacks, algebraic attacks and correlation attacks.
The Block Cipher Square
- Computer Science, MathematicsFSE
- 1997
A new 128-bit block cipher called Square, which concentrates on the resistance against differential and linear cryptanalysis, and the publication of the resulting cipher for public scrutiny is published.
A New Stream Cipher HC-256
- Computer Science, MathematicsFSE
- 2004
Stream cipher HC-256 is proposed in this paper. It generates keystream from a 256-bit secret key and a 256-bit initialization vector. HC-256 consists of two secret tables, each one with 1024 32-bit…
Cryptanalysis of Alleged A5 Stream Cipher
- Computer ScienceEUROCRYPT
- 1997
A time-memory trade-off attack based on the birthday paradox which yields the unknown internal state at a known time for a known keystream sequence is pointed out, and a so-called internal state reversion attack is proposed and analyzed by the theory of critical and subcritical branching processes.
Rabbit: A New High-Performance Stream Cipher
- Computer Science, MathematicsFSE
- 2003
The cryptanalysis of Rabbit did not reveal an attack better than exhaustive key search, but the cipher is characterized by a high performance in software with a measured encryption/decryption speed of 3.7 clock cycles per byte on a Pentium III processor.
Slide Attacks
- Computer Science, MathematicsFSE
- 1999
A new generic known- (or sometimes chosen-) plaintext attack on product ciphers is described, which is called the slide attack and which in many cases is independent of the number of rounds of a cipher.