1999
DOI: 10.1007/3-540-48405-1_12
|View full text |Cite
|
Sign up to set email alerts
|

Fast Correlation Attacks Based on Turbo Code Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
64
0
3

Year Published

2000
2000
2006
2006

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 62 publications
(67 citation statements)
references
References 15 publications
0
64
0
3
Order By: Relevance
“…Several minor improvements of this original attack were proposed in [21,12,1,13,15] but these papers did not introduce any important modification of the basic underlying concepts. Johansson and Jönsson recently proposed two new techniques for fast correlation attacks: the main idea is to derive from (s n ) n<N a sequence which can be seen as a corrupted version of a word of a convolutional code [6] or of a turbo code [7]. These new attacks increase the highest achievable error probability p for given values of L and N (L is the length of the LFSR generating σ and N is the number of known bits of the running-key).…”
Section: Fig 2 Correlation Attack Involving K Constituent Lfsrsmentioning
confidence: 99%
“…Several minor improvements of this original attack were proposed in [21,12,1,13,15] but these papers did not introduce any important modification of the basic underlying concepts. Johansson and Jönsson recently proposed two new techniques for fast correlation attacks: the main idea is to derive from (s n ) n<N a sequence which can be seen as a corrupted version of a word of a convolutional code [6] or of a turbo code [7]. These new attacks increase the highest achievable error probability p for given values of L and N (L is the length of the LFSR generating σ and N is the number of known bits of the running-key).…”
Section: Fig 2 Correlation Attack Involving K Constituent Lfsrsmentioning
confidence: 99%
“…In stream ciphers applications, when f is used in a pseudo-random generator as a combining function or as a filtering function, the existence of a "good" approximation of f by an affine function makes fast correlation attacks feasible [17,13,12]. Similarly, if f is used in a block cipher as an S-box component, this would lead to successful linear attacks [15].…”
Section: Cryptographic Criteria For Boolean Functionsmentioning
confidence: 99%
“…fast correlation attacks (Meier,Staffelbach [18], Chepyzhov, Smeets [5], Johansson, Joensson [12,13]), backtracking attacks (Golic [10], Zenner, Krause, Lucks [24], Fluhrer, Lucks [9], Zenner [23]), time-space tradeoffs (Biryukov, Shamir [4]), BDD-based attacks (Krause [15]) etc. For such stream ciphers many corresponding design criteria (correlation immunity, large period and linear complexity, good local statistics etc.)…”
Section: Introductionmentioning
confidence: 99%