This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Decrypting a Class of Stream Ciphers Using Ciphertext Only
January 1985 (vol. 34 no. 1)
pp. 81-85
T. Siegenthaler, Institute for Communication Technology, Federal Institute of Technology
Pseudonoise sequences generated by linear feedback shift registers [1] with some nonlinear combining function have been proposed [2]?[5] for cryptographic applications as running key generators in stream ciphers. In this correspondence it will be shown that the number of trials to break these ciphers can be significantly reduced by using correlation methods. By comparison of computer simulations and theoretical results based on a statistical model, the validity of this analysis is demonstrated. Rubin [6] has shown that it is computationally feasible to solve a cipher proposed by Pless [2] in a known plaintext attack, using as few as 15 characters. Here, the number of ciphertext symbols is determined to perform a ciphertext-only attack on the Pless cipher using the correlation attack. Our conclusion from the analysis is that the pseudonoise generator's output sequence and the sequences generated by the linear feedback shift registers should be uncorrelated. This leads to constraints for the nonlinear combining function to be used.
Index Terms:
pseudonoise generator, Correlation, cryptanalysis, exhaustive trials
Citation:
T. Siegenthaler, "Decrypting a Class of Stream Ciphers Using Ciphertext Only," IEEE Transactions on Computers, vol. 34, no. 1, pp. 81-85, Jan. 1985, doi:10.1109/TC.1985.1676518
Usage of this product signifies your acceptance of the Terms of Use.