Improved fast correlation attack on the shrinking and self-shrinking generators

Kitae Jeong, Jaechul Sung, Seokhie Hong, Sangjin Lee, Jaeheon Kim, Deukjo Hong

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Scopus citations

Abstract

The fast correlation attack on the shrinking generator proposed by Zhang et al. in [8] has a room for improvement that the probability that the guessing bit is incorrect increases in certain case. In this paper, we propose a method to improve Zhang et al.'s attack. Reflecting our idea, the fast correlation attack on the shrinking and self-shrinking generator is more efficient than Zhang et al.'s attack in both data and computational complexities. For the shrinking generator, required keystream bits and computational complexity are reduced about 69% and 27%, respectively; For the self-shrinking generator, required keystream bits and computational complexity are reduced about 46% and 22%, respectively.

Original languageEnglish
Title of host publicationProgress in Cryptology, VIETCRYPT 2006 - 1st International Conference on Cryptology in Vietnam, Revised Selected Papers
PublisherSpringer Verlag
Pages260-270
Number of pages11
ISBN (Print)3540687998, 9783540687993
DOIs
StatePublished - 2006
Event1st International Conference on Cryptology in Vietnam, VIETCRYPT 2006 - Hanoi, Viet Nam
Duration: 25 Sep 200628 Sep 2006

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4341 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st International Conference on Cryptology in Vietnam, VIETCRYPT 2006
Country/TerritoryViet Nam
CityHanoi
Period25/09/0628/09/06

Keywords

  • Clock-controlled generator
  • Fast correlation attack
  • Self-Shrinking generator
  • Shrinking generator

Fingerprint

Dive into the research topics of 'Improved fast correlation attack on the shrinking and self-shrinking generators'. Together they form a unique fingerprint.

Cite this