Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Linear Models for Keystream Generators
Golic J. IEEE Transactions on Computers45 (1):41-49,1996.Type:Article
Date Reviewed: Jul 1 1997

Consider a keystream generator (KSG) with M bits of memory. For dimensional reasons, there exists at least one linear function L of any M + 1 consecutive output bits that is not balanced. Under reasonable hypotheses, L is independent of time, so L (essentially an ( M + 1 ) × 1 matrix) is a function of the initial state vector S0 of the KSG. The author’s linear sequential circuit approximation is used to find candidates for L. In order to exploit this weakness, a portion of the output proportional to the square of the sum, over all linear models of a given length, of the correlation with the zero function becomes a cryptographic design criterion.

The feasibility of this computation depends on the assumption that the “functions effectively depend on small subsets of the state variables.” I cannot decide whether this assumption is reasonable in all cases. However, the author is able to derive the required length of the keystream sequence to exploit the weakness for many KSGs. This seems to be the main improvement over the author’s earlier proceedings paper [1].

Reviewer:  J. Wolper Review #: CR120339 (9707-0517)
1) Golic, J. D. Correlation via linear sequential circuit approximation combiners with memory. In Advances in Cryptology--Proceedings of EUROCRYPT ’92, R. A. Rueppel, Ed., Springer, New York, 1992, 113–123.
Bookmark and Share
 
Design (B.5.1 )
 
 
Sequential Circuits (B.6.1 ... )
 
 
Simulation (B.5.2 ... )
 
 
Design Aids (B.5.2 )
 
 
Design Styles (B.6.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Design": Date
Design principles for achieving high-performance submicron digital technologies
Fredkin E., Toffoli T. In Collision-based computing. London, UK: Springer-Verlag, 2002. Type: Book Chapter
Oct 15 2003
Performance prediction for Apache Spark platform
Wang K., Khan M.  HPCC, CSS & ICESS 2015 (Proceedings of the 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conf. on Embedded Software and Systems, Aug 24-26, 2015)166-173, 2015. Type: Proceedings
Dec 5 2016

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy