Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Statistical attack on combination keystream generators with irregular clocking

View through CrossRef
Combination keystream generators with irregular clocking are the basis for constructing of stream ciphers, the most famous of which are A5 and Alpha1. Each such generator consists of several binary linear feedback shift registers, a Boolean combination function, and a register clocking control unit that defines the rules by which registers are shifted in the process of keystream generating. Despite certain weaknesses of known stream ciphers based on combination keystream generators with irregular clocking, such generators still arouse theoretical and applied interest due to the simplicity of their structure and the potential ability to provide security to a wide class of attacks, provided that their components are properly selected. Combination keystream generators, each register of which is either shifted by one step or is idle in each clock cycle, with one of the registers clocking regularly, are investigated in the article. Previously, the authors of the article showed that the mentioned generators have an inherent weakness, which consists in statistical dependence between each neighboring signs of their output sequences. The main result of this article is a statistical attack based on the mentioned weakness. The proposed attack is aimed at restoring the initial state of the register clocking uniformly by a known output sequence of the generator or several such sequences produced by the generator in the chosen IV mode. It is shown that in the latter case the complexity of the attack depends linearly on the length of the mentioned register. An analytical bound of the amount of keystream required to implement the proposed attack with the required success probability is obtained. In particular, it is shown that for Alpha1 the corresponding amount is approximately 300 keystream frames along with their corresponding initialization vectors. Conditions that weaken the security of generators with irregular clocking against the proposed attack are formulated. They consist in the fact that the Walsh-Hadamard coefficients of the combination function take zero values on all vectors of weight 0 or 1 and non-zero values on certain vectors of weight 2. It is shown that these conditions are fulfilled for the keystream generator of Alpha1. In this case, the average amount of keystream  required to recover the initial state of an arbitrary keystream generator that satisfies the above conditions is of the same order as for Alpha1.
Title: Statistical attack on combination keystream generators with irregular clocking
Description:
Combination keystream generators with irregular clocking are the basis for constructing of stream ciphers, the most famous of which are A5 and Alpha1.
Each such generator consists of several binary linear feedback shift registers, a Boolean combination function, and a register clocking control unit that defines the rules by which registers are shifted in the process of keystream generating.
Despite certain weaknesses of known stream ciphers based on combination keystream generators with irregular clocking, such generators still arouse theoretical and applied interest due to the simplicity of their structure and the potential ability to provide security to a wide class of attacks, provided that their components are properly selected.
Combination keystream generators, each register of which is either shifted by one step or is idle in each clock cycle, with one of the registers clocking regularly, are investigated in the article.
Previously, the authors of the article showed that the mentioned generators have an inherent weakness, which consists in statistical dependence between each neighboring signs of their output sequences.
The main result of this article is a statistical attack based on the mentioned weakness.
The proposed attack is aimed at restoring the initial state of the register clocking uniformly by a known output sequence of the generator or several such sequences produced by the generator in the chosen IV mode.
It is shown that in the latter case the complexity of the attack depends linearly on the length of the mentioned register.
An analytical bound of the amount of keystream required to implement the proposed attack with the required success probability is obtained.
In particular, it is shown that for Alpha1 the corresponding amount is approximately 300 keystream frames along with their corresponding initialization vectors.
Conditions that weaken the security of generators with irregular clocking against the proposed attack are formulated.
They consist in the fact that the Walsh-Hadamard coefficients of the combination function take zero values on all vectors of weight 0 or 1 and non-zero values on certain vectors of weight 2.
It is shown that these conditions are fulfilled for the keystream generator of Alpha1.
In this case, the average amount of keystream  required to recover the initial state of an arbitrary keystream generator that satisfies the above conditions is of the same order as for Alpha1.

Related Results

Investigation on Clocking Effect of Diffuser in a Multi-Stage Centrifugal Pump
Investigation on Clocking Effect of Diffuser in a Multi-Stage Centrifugal Pump
Abstract The clocking effect is an important phenomenon in the multi-stage Rotating machinery. In order to master the rules and mechanism of diffuser clocking effect on the...
An experimental investigation of the vane clocking effects on the centrifugal compressor time-averaged performance
An experimental investigation of the vane clocking effects on the centrifugal compressor time-averaged performance
The clocking effect, known as a potential means to improve the aerodynamic performance of the turbomachinery, has been investigated widely in the multistage axial turbomachinery, b...
Pembrolizumab and Sarcoma: A meta-analysis
Pembrolizumab and Sarcoma: A meta-analysis
Abstract Introduction: Pembrolizumab is a monoclonal antibody that promotes antitumor immunity. This study presents a systematic review and meta-analysis of the efficacy and safety...
Automated Integration of Dual-Edge Clocking for Low-Power Operation in Nanometer Nodes
Automated Integration of Dual-Edge Clocking for Low-Power Operation in Nanometer Nodes
Clocking power, including both clock distribution and registers, has long been one of the primary factors in the total power consumption of many digital systems. One straightforwar...
Breast Carcinoma within Fibroadenoma: A Systematic Review
Breast Carcinoma within Fibroadenoma: A Systematic Review
Abstract Introduction Fibroadenoma is the most common benign breast lesion; however, it carries a potential risk of malignant transformation. This systematic review provides an ove...
Enhancing analog circuit security through obfuscation
Enhancing analog circuit security through obfuscation
The focus of this dissertation is the safeguarding of analog circuits against IP piracy attacks, which includes the development of a novel method to secure analog IP, the assessmen...
AMPLITUDE METHODS FOR CONTROL OF GAS GENERATORS WATER SAVING SYSTEMS
AMPLITUDE METHODS FOR CONTROL OF GAS GENERATORS WATER SAVING SYSTEMS
The methods of control of the technical station of gas generators of systems for saving and supplying water are examined, which are based on the variation of their amplitude-freque...

Back to Top