2018
DOI: 10.1515/math-2018-0058
|View full text |Cite
|
Sign up to set email alerts
|

Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator

Abstract: Decimation-based sequence generators are a class of non-linear cryptographic generators designed to be used in hardware implementations. An inherent characteristic of such generators is that their output sequences are interleaved sequences. This profitable characteristic can be used in the cryptanalysis of those generators. In this work, emphasis is on the most representative decimation-based generator, the shrinking generator, which has been cryptanalyzed just by solving linear equation systems. Compared with… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 24 publications
0
3
0
Order By: Relevance
“…In [18], the authors determined how to compute the shifts of the interleaved sequences that compose the shrunken sequence. This fact can be used advantageously to design cryptanalytic attacks against this generator [18,[21][22][23][24]. A natural way to deal with this vulnerability is to alter the shifts or interleave PN-sequences of different primitive polynomials.…”
Section: Introductionmentioning
confidence: 99%
“…In [18], the authors determined how to compute the shifts of the interleaved sequences that compose the shrunken sequence. This fact can be used advantageously to design cryptanalytic attacks against this generator [18,[21][22][23][24]. A natural way to deal with this vulnerability is to alter the shifts or interleave PN-sequences of different primitive polynomials.…”
Section: Introductionmentioning
confidence: 99%
“…The analogue of n-fold interleaving for finite codes is referred to by coding theorists as block interleaving of depth n. Decimation and interleaving operators together have been considered both in cryptography and cryptanalysis, cf. Rueppel [39] and Cardell et al [10]. Since methods of encoding and decoding can be viewed as dynamical processes, it is of interest to view these operations in a dynamical context.…”
Section: Introductionmentioning
confidence: 99%
“…Among the different examples of decimation-based generators we can enumerate: (1) the shrinking generator [23] with two LFSRs for a mutual decimation, (2) the self-shrinking generator [24] with just one LFSR that decimates itself and (3) the generalized self-shrinking generator [25] that outputs a family of pseudo-random sequences, the so-called generalized self-shrunken sequences (GSS-sequences). Different cryptanalytic attacks against the previous generators can be found in the literature [26][27][28][29][30].…”
mentioning
confidence: 99%