Publication 1996 Issue No. 4 - April Abstract - Correlation Attacks on Clock-Controlled Shift Registers in Keystream Generators
 This Article Share Bibliographic References Add to: Digg Furl Spurl Blink Simpy Google Del.icio.us Y!MyWeb Search Similar Articles Articles by Jovan Dj. Golic Articles by Slobodan V. Petrovic
Correlation Attacks on Clock-Controlled Shift Registers in Keystream Generators
April 1996 (vol. 45 no. 4)
pp. 482-486
 ASCII Text x Jovan Dj. Golic, Slobodan V. Petrovic, "Correlation Attacks on Clock-Controlled Shift Registers in Keystream Generators," IEEE Transactions on Computers, vol. 45, no. 4, pp. 482-486, April, 1996.
 BibTex x @article{ 10.1109/12.494106,author = {Jovan Dj. Golic and Slobodan V. Petrovic},title = {Correlation Attacks on Clock-Controlled Shift Registers in Keystream Generators},journal ={IEEE Transactions on Computers},volume = {45},number = {4},issn = {0018-9340},year = {1996},pages = {482-486},doi = {http://doi.ieeecomputersociety.org/10.1109/12.494106},publisher = {IEEE Computer Society},address = {Los Alamitos, CA, USA},}
 RefWorks Procite/RefMan/Endnote x TY - JOURJO - IEEE Transactions on ComputersTI - Correlation Attacks on Clock-Controlled Shift Registers in Keystream GeneratorsIS - 4SN - 0018-9340SP482EP486EPD - 482-486A1 - Jovan Dj. Golic, A1 - Slobodan V. Petrovic, PY - 1996KW - Clock-controlled shift registersKW - constrained edit distancesKW - correlation attacksKW - keystream generators.VL - 45JA - IEEE Transactions on ComputersER -

Abstract—A concept of constrained many-to-one string edit distances, with or without memory, based on edit operations of deletion and substitution is introduced, and the recursive algorithms for their efficient computation are derived. Their use for correlation attacks on clock-controlled shift register based keystream generators is proposed, the divide and conquer effect is examined, and the generalized reducibility property of functions with memory is pointed out as a design criterion.

[1] J.Dj. ${\rm Goli}\mathop{\!\!\!}{\rm c}\limits^{'}$ and M.J. ${\rm Mihaljevi}\mathop{\!\!\!}{\rm c}\limits^{'}$,"A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance," J. Cryptology, vol. 3, no. 3, pp. 201-212, 1991.
[2] J.Dj. ${\rm Goli}\mathop{\!\!\!}{\rm c}\limits^{'}$,"Correlation Via Linear Sequential Circuit Approximation of Combiners with Memory," Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, pp. 113-123, Springer-Verlag, 1993.
[3] J.Dj. ${\rm Goli}\mathop{\!\!\!}{\rm c}\limits^{'}$ and S.V. ${\rm Petrovi}\mathop{\!\!\!}{\rm c}\limits^{'}$,"A Generalized Correlation Attack With a Probabilistic Constrained Edit Distance," Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, vol. 658, pp. 472-476, Springer-Verlag, 1993.
[4] D. Gollmann and W.G. Chambers,"Clock-controlled Shift Registers: A Review," IEEE J. Select. Areas Communications, vol. 7, no. 4, pp. 525-533, May 1989.
[5] W. Meier and O. Stafflebach, “Fast Correlation Attacks on Certain Stream Ciphers,” J. Cryptology, vol. 1, pp. 159-176, 1989.
[6] R.A. Rueppel,"Correlation Immunity and the Summation Generator," Advances in Cryptology - CRYPTO '85, Lecture Notes in Computer Science, vol. 218, pp. 260-272, Springer-Verlag, 1986.
[7] T. Siegenthaler, “Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications,” IEEE Trans. Information Theory, vol. 30, no. 5, pp. 776-780, Sept. 1984.
[8] T. Siegenthaler,"Decrypting a Class of Stream Ciphers Using Ciphertext Only," IEEE Trans. Comput., vol. 34, pp. 81-85, Jan. 1985.
[9] G.Z. Xiao and J.L. Massey,"A Spectral Characterization of Correlation-immune Combining Functions," IEEE Trans. Inform. Theory, vol. 34, pp. 569-571, May 1988.
[10] M.V. Zivkovic,"An Algorithm for the Initial State Reconstruction of the Clock-controlled Shift Register," IEEE Trans. Inform. Theory, vol. 37, pp. 1488-1490, Sept. 1991.

Index Terms:
Clock-controlled shift registers, constrained edit distances, correlation attacks, keystream generators.
Citation:
Jovan Dj. Golic, Slobodan V. Petrovic, "Correlation Attacks on Clock-Controlled Shift Registers in Keystream Generators," IEEE Transactions on Computers, vol. 45, no. 4, pp. 482-486, April 1996, doi:10.1109/12.494106