2002
DOI: 10.1007/3-540-46035-7_15
|View full text |Cite
|
Sign up to set email alerts
|

BDD-Based Cryptanalysis of Keystream Generators

Abstract: Abstract. Many of the keystream generators which are used in practice are LFSR-based in the sense that they produce the keystream according to a rule y = C(L(x)), where L(x) denotes an internal linear bitstream, produced by a small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. We present an n O(1) 2 (1−α)/(1+α)n time bounded attack, the FBDD-attack, against LFSR-based generators, which computes the secret initial state x ∈ {0, 1} n from cn consec… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
83
0

Year Published

2005
2005
2006
2006

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 75 publications
(83 citation statements)
references
References 11 publications
0
83
0
Order By: Relevance
“…Therefore, we have α = γ = 1 4 , and [10] showed that |Q m | ≤ 32m. Hence, we obtain from Theorem 1:…”
Section: Applicationsmentioning
confidence: 95%
See 4 more Smart Citations
“…Therefore, we have α = γ = 1 4 , and [10] showed that |Q m | ≤ 32m. Hence, we obtain from Theorem 1:…”
Section: Applicationsmentioning
confidence: 95%
“…It consists of only one LFSR and no memory. [10] showed that for the self-shrinking Generator, we have α ≈ 0.2075 and γ = 0.5 as well as |Q m | ≤ m 2 for m ≥ 1.…”
Section: Applicationsmentioning
confidence: 98%
See 3 more Smart Citations