File(s) under permanent embargo
Algebraic attacks on clock-controlled cascade ciphers
journal contribution
posted on 2006-01-01, 00:00 authored by K H Wong, Bernard Colbert, Lynn BattenLynn Batten, S Al-HinaiIn this paper, we mount the first algebraic attacks against clock controlled cascade stream ciphers. We first show how to obtain relations between the internal state bits and the output bits of the Gollmann clock controlled cascade stream ciphers. We demonstrate that the initial states of the last two shift registers can be determined by the initial states of the others. An alternative attack on the Gollmann cascade is also described, which requires solving quadratic equations. We then present an algebraic analysis of Pomaranch, one of the phase two proposals to eSTREAM. A system of equations of maximum degree four that describes the full cipher is derived. We also present weaknesses in the filter functions of Pomaranch by successfully computing annihilators and low degree multiples of the functions.
History
Journal
Lecture Notes in Computer ScienceVolume
4329Pagination
32 - 47Publisher
Springer-VerlagLocation
Berlin, GermanyPublisher DOI
ISSN
0302-9743eISSN
1611-3349Language
engPublication classification
C1 Refereed article in a scholarly journalCopyright notice
2006, Springer-VerlagUsage metrics
Categories
No categories selectedKeywords
Licence
Exports
RefWorks
BibTeX
Ref. manager
Endnote
DataCite
NLM
DC