On a Resynchronization Weakness in a Class of Combiners with Memory
نویسندگان
چکیده
In some applications for synchronous stream ciphers frequent resynchronization or resynchronization upon request may be necessary. We describe a weakness in a class of combiners with one-bit memory which makes them vulnerable in such applications requesting resynchronization. A correlation attack based on chi-square criterion, which in some aspects complements the attack studied by Daemen et. al., is presented. Stream ciphers are an important class of encryption algorithms. They encrypt individual characters of a plaintext one at a time, using encryption transformation, which varies with time. We consider a weakness of synchronous stream ciphers with one-bit memory. Our investigations justify the designers intuitive understanding that in conservative design of such combiners should not be used linear memory functions, despite their easy implementation.
منابع مشابه
A NEW TWO STEP CLASS OF METHODS WITH MEMORY FOR SOLVING NONLINEAR EQUATIONS WITH HIGH EFFICIENCY INDEX
It is attempted to extend a two-step without memory method to it's with memory. Then, a new two-step derivative free class of without memory methods, requiring three function evaluations per step, is suggested by using a convenient weight function for solving nonlinear equations. Eventually, we obtain a new class of methods by employing a self-accelerating parameter calculated in each iterative...
متن کاملA new iterative with memory class for solving nonlinear equations
In this work we develop a new optimal without memory class for approximating a simple root of a nonlinear equation. This class includes three parameters. Therefore, we try to derive some with memory methods so that the convergence order increases as high as possible. Some numerical examples are also presented.
متن کاملAction Research: Solving Sixth Grade Students Writing Disorder Based on the Results of Nepsy Neuropsychology Test
Introduction: Learning to write is very important because writing is a powerful tool for thinking, learning, and the need to continue studying to enter a variety of professions. Meanwhile, there are students who have difficulty learning to write for a variety of reasons. Therefore, the present study was conducted with the aim of eliminating the dictation disorder of sixth grade elementary stude...
متن کاملDesign Principles for Combiners with Memory
Stream ciphers are widely used for online-encryption of arbitrarily long data, for example when transmitting speech-data between a mobile phone and a base station. An important class of stream ciphers are combiners with memory, with the E0 generator from the Bluetooth standard for wireless communication being their most prominent example. In this paper, we develop design principles for increasi...
متن کاملOn the Desing and Test of a Prototype of Biped Actuated by Shape Memory Alloys
In this paper the design of a biped robot actuated with Shape Memory Alloy (SMA) springs with minimum degrees of freedom is presented. SMA springs are a class of smart materials that are known for their high power to mass and volume ratios. It was shown that utilizing spring type of SMAs have many advantages as large deformation, smooth motion, silent and clean movement compared to ordinary typ...
متن کامل