2005
DOI: 10.1007/11502760_13
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the Bit-Search Generator and Sequence Compression Techniques

Abstract: Abstract. Algebraic attacks on stream ciphers apply (at least theoretically) to all LFSR-based stream ciphers that are clocked in a simple and/or easily predictable way. One interesting approach to help resist such attacks is to add a component that de-synchronizes the output bits of the cipher from the clock of the LFSR. The Bit-search generator, recently proposed by Gouget and Sibert, is inspired by the so-called SelfShrinking Generator which is known for its simplicity (conception and implementation-wise) l… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
26
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(27 citation statements)
references
References 7 publications
(10 reference statements)
1
26
0
Order By: Relevance
“…Such components include decimation components such as the Shrinking Generator [3] and the Self-Shrinking Generator [15]. Decimation has come back in focus recently with the Bit-Search Generator [9] and subsequent variations on it [10].…”
Section: Introductionmentioning
confidence: 99%
“…Such components include decimation components such as the Shrinking Generator [3] and the Self-Shrinking Generator [15]. Decimation has come back in focus recently with the Bit-Search Generator [9] and subsequent variations on it [10].…”
Section: Introductionmentioning
confidence: 99%
“…In comparison, the attacker requires both time and data complexity of 2 64 in the attack on ABSG in [9]. Thus our timing attack can be viewed as a trade-off of a 2 23 increase in computational complexity in exchange for a savings of 2 64 in memory.…”
Section: Timing Analysis On Absgmentioning
confidence: 99%
“…Examples of IDGs are Shrinking Generator (SG) [4], SelfShrinking Generator (SSG) [13] and Bit Search Generators (BSG) [8]. In this paper we focus on ABSG [9], a variant of BSG. We choose to study ABSG as it faciltates our analysis of DECIM later in the paper.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations