A fast correlation attack on LILI-128
نویسندگان
چکیده
In this letter we demonstrate a fast correlation attack on the recently proposed stream cipher LILI-128. The attack has complexity around 2 bit operations assuming a received sequence of length around 2 bits and a precomputation phase of complexity 2 table lookups. This complexity is significantly lower than 2, which was conjectured by the inventors of LILI-128 to be a lower bound on the complexity of any attack.
منابع مشابه
Algebraic Attacks on Stream Ciphers (survey)
Most stream ciphers based on linear feedback shift registers (LFSR) are vulnerable to recent algebraic attacks. In this survey paper, we describe generic attacks: existence of algebraic equations and fast algebraic attacks. The generic attacks only states the existence and gives the upper bound of the complexity. Thus we should find good algebraic equations, case by case, in order to apply the ...
متن کاملA New Simple Technique to Attack Filter Generators and Related Ciphers
This paper presents a new simple distinguishing attack that can be applied on stream ciphers constructed from filter generators or similar structures. We demonstrate the effectiveness by describing key recovery attacks on the stream cipher LILI-128. One attack on LILI-128 requires 2 bits of keystream and a computational complexity of roughly 2. This is a significant improvement compared to othe...
متن کاملSome Results on Distinguishing Attacks on Stream Ciphers
Stream ciphers are cryptographic primitives that are used to ensure the privacy of a message that is sent over a digital communication channel. In this thesis we will present new cryptanalytic results for several stream ciphers. The thesis provides a general introduction to cryptology, explains the basic concepts, gives an overview of various cryptographic primitives and discusses a number of d...
متن کاملThe LILI-128 Keystream Generator
The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently known styles of attack. LILI is simple to implement in hardware or software.
متن کاملA Time-Memory Tradeoff Attack Against LILI-128
In this note we discuss a novel and simple time-memory tradeoff attack against the stream cipher LILI-128. The attack defeats the security advantage of having an irregular stepping function. The attack requires 2 bits of keystream, a lookup table of 2 89-bit words and computational effort which is roughly equivalent to 2 DES operations.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Process. Lett.
دوره 81 شماره
صفحات -
تاریخ انتشار 2002