This Article 
 Bibliographic References 
 Add to: 
Correlation Attacks on Clock-Controlled Shift Registers in Keystream Generators
April 1996 (vol. 45 no. 4)
pp. 482-486

Abstract—A concept of constrained many-to-one string edit distances, with or without memory, based on edit operations of deletion and substitution is introduced, and the recursive algorithms for their efficient computation are derived. Their use for correlation attacks on clock-controlled shift register based keystream generators is proposed, the divide and conquer effect is examined, and the generalized reducibility property of functions with memory is pointed out as a design criterion.

[1] J.Dj. ${\rm Goli}\mathop{\!\!\!}{\rm c}\limits^{'}$ and M.J. ${\rm Mihaljevi}\mathop{\!\!\!}{\rm c}\limits^{'}$,"A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance," J. Cryptology, vol. 3, no. 3, pp. 201-212, 1991.
[2] J.Dj. ${\rm Goli}\mathop{\!\!\!}{\rm c}\limits^{'}$,"Correlation Via Linear Sequential Circuit Approximation of Combiners with Memory," Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, pp. 113-123, Springer-Verlag, 1993.
[3] J.Dj. ${\rm Goli}\mathop{\!\!\!}{\rm c}\limits^{'}$ and S.V. ${\rm Petrovi}\mathop{\!\!\!}{\rm c}\limits^{'}$,"A Generalized Correlation Attack With a Probabilistic Constrained Edit Distance," Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, pp. 472-476, Springer-Verlag, 1993.
[4] D. Gollmann and W.G. Chambers,"Clock-controlled Shift Registers: A Review," IEEE J. Select. Areas Communications, vol. 7, no. 4, pp. 525-533, May 1989.
[5] W. Meier and O. Stafflebach, “Fast Correlation Attacks on Certain Stream Ciphers,” J. Cryptology, vol. 1, pp. 159-176, 1989.
[6] R.A. Rueppel,"Correlation Immunity and the Summation Generator," Advances in Cryptology - CRYPTO '85, Lecture Notes in Computer Science, vol. 218, pp. 260-272, Springer-Verlag, 1986.
[7] T. Siegenthaler, “Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications,” IEEE Trans. Information Theory, vol. 30, no. 5, pp. 776-780, Sept. 1984.
[8] T. Siegenthaler,"Decrypting a Class of Stream Ciphers Using Ciphertext Only," IEEE Trans. Comput., vol. 34, pp. 81-85, Jan. 1985.
[9] G.Z. Xiao and J.L. Massey,"A Spectral Characterization of Correlation-immune Combining Functions," IEEE Trans. Inform. Theory, vol. 34, pp. 569-571, May 1988.
[10] M.V. Zivkovic,"An Algorithm for the Initial State Reconstruction of the Clock-controlled Shift Register," IEEE Trans. Inform. Theory, vol. 37, pp. 1488-1490, Sept. 1991.

Index Terms:
Clock-controlled shift registers, constrained edit distances, correlation attacks, keystream generators.
Jovan Dj. Golic, Slobodan V. Petrovic, "Correlation Attacks on Clock-Controlled Shift Registers in Keystream Generators," IEEE Transactions on Computers, vol. 45, no. 4, pp. 482-486, April 1996, doi:10.1109/12.494106
Usage of this product signifies your acceptance of the Terms of Use.