A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher

@inproceedings{Chen2003ACD,
  title={A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher},
  author={Kevin Chen and Leonie Ruth Simpson and Matt Henricksen and William Millan and Ed Dawson},
  booktitle={ICISC},
  year={2003}
}
Alpha1 is a stream cipher with a key size of 128 bits. It was proposed as a replacement algorithm for the stream cipher A5 to supply confidentiality over mobile communication systems. Alpha1 consists of four binary linear feedback shift registers. Previous attacks on Alpha1 only recover the initial state of the shortest register. In this paper we present a complete divide and conquer attack, starting with an improved attack on the shortest register, and continuing the attack to recover the… 
Algebraic Attacks on Clock-Controlled Stream Ciphers
TLDR
An algebraic attack approach to a family of irregularly clock-controlled bit-based linear feedback shift register systems is presented and it is demonstrated that the degree of a functional relationship between the registers can be bounded by two.
Mutually Clock-Controlled Feedback Shift Registers Provide Resistance to Algebraic Attacks
TLDR
It is shown that, if there are no regularly clocked shift registers included in the system, mutually clock-controlled feedback shift register ciphers appear to be highly resistant to algebraic attacks.
Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers
TLDR
This paper discusses GD attacks on clock-controlled stream ciphers, which use irregular clocking for a non-linear function, and proposes and calculates the process complexity of these attacks.
Cryptanalysis Techniques for Stream Cipher: A Survey
TLDR
This study aims to provide a comprehensive survey that summarizes the existing cryptanalysis techniques for stream ciphers and will facilitate the security analysis of the existing stream cipher designs and provide an opportunity to understand the requirements for developing a secure and efficient stream cipher design.

References

SHOWING 1-10 OF 131 REFERENCES
DECIM, a new stream cipher for hardware applications
TLDR
The design of the cipher is based on both a nonlinear filter LFSR and an irregular decimation mechanism recently introduced and called the ABSG and the design goal is to produce a stream cipher with a compact hardware implementation and operating at high rates.
Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers
TLDR
It is shown that a new class of self-synchronizing stream ciphers combining LFSR and FCSR architectures is extremely vulnerable to chosen ciphertext attack.
Divide and Conquer Attack on ABC Stream Cipher
TLDR
The whole initial state of ABC could be found in time complexity of 2 simple word operations using a few output words, and the total time and data complexity of the attack for breaking the whole cipher are 2simple word operations and 10×2 words respectively.
Weaknesses of COSvd (2, 128) Stream Cipher
The COSvd (2,128) cipher was proposed at the ECRYPT SASC'2004 workshop by Filiol et. al to strengthen the past COS (2,128) stream cipher. It uses clock-controlled non-linear feedback registers
The WG Stream Cipher
TLDR
A new synchronous stream cipher, called WG cipher, based on WG (Welch-Gong) transformations, designed to produce keystream with guaranteed randomness properties, which is resistant to Time/Memory/Data tradeoff attacks, algebraic attacks and correlation attacks.
The Block Cipher Square
TLDR
A new 128-bit block cipher called Square, which concentrates on the resistance against differential and linear cryptanalysis, and the publication of the resulting cipher for public scrutiny is published.
A New Stream Cipher HC-256
Stream cipher HC-256 is proposed in this paper. It generates keystream from a 256-bit secret key and a 256-bit initialization vector. HC-256 consists of two secret tables, each one with 1024 32-bit
Cryptanalysis of Alleged A5 Stream Cipher
TLDR
A time-memory trade-off attack based on the birthday paradox which yields the unknown internal state at a known time for a known keystream sequence is pointed out, and a so-called internal state reversion attack is proposed and analyzed by the theory of critical and subcritical branching processes.
Rabbit: A New High-Performance Stream Cipher
TLDR
The cryptanalysis of Rabbit did not reveal an attack better than exhaustive key search, but the cipher is characterized by a high performance in software with a measured encryption/decryption speed of 3.7 clock cycles per byte on a Pentium III processor.
Slide Attacks
TLDR
A new generic known- (or sometimes chosen-) plaintext attack on product ciphers is described, which is called the slide attack and which in many cases is independent of the number of rounds of a cipher.
...
1
2
3
4
5
...