# Deterministic Cryptanalysis of some Stream Ciphers

### P. Caballero-Gil, A. Fúster-Sabater, C. Hernández-Goya

#### 2009

#### Abstract

A new graph-based approach to edit distance cryptanalysis of some clock-controlled generators is here presented in order to simplify search trees of the original attacks. In particular, the proposed improvement is based on cut sets defined on some graphs so that only the most promising branches of the search tree have to be analyzed because certain shortest paths provide the edit distances. The strongest aspects of the proposal are: a) the obtained results from the attack are absolutely deterministic and b) many inconsistent initial states are recognized beforehand and avoided during search.

#### References

- Caballero-Gil, P. and Fúster-Sabater, A. (2005): Improvement of the Edit Distance Attack to Clock-Controlled LFSR-Based Stream Ciphers. Lecture Notes in Computer Science 3643 Springer-Verlag: 355-364.
- Coppersmith, D., Krawczyk, H. and Mansour, H. (1994): The Shrinking Generator. Lecture Notes in Computer Science 773 Springer-Verlag: 22-39.
- Daemen, J. and Van Assche G. (2005): Distinguishing Stream Ciphers with Convolutional Filters.Cryptology ePrint Archive Report 039.
- Golic, J.D. (1998): Recent Advances in Stream Cipher Cryptanalysis. Publication de l'Institut Mathematique Tome 64 (78) : 183-204.
- Golic, J.D. (2005): Embedding probabilities for the Alternating Step Generator. IEEE Transactions on Information Theory, Volume 51, Issue 7, July: 2543-2553.
- Golic, J.D. and Mihaljevic, M.J. (1991): A Generalized Correlation Attack on a Class of Stream Ciphers Based on the Levenshtein Distance. Journal of Cryptology 3, No. 3: 201- 212.
- Golic, J.D. and Petrovic, S. (1993): A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance. Lecture Notes in Computer Science 658 Springer-Verlag: 472- 476.
- Gollmann, D. and Chambers, W.C. (1989): Clock-Controlled Shift Registers: A Review. IEEE Transactions on Selected Areas in Communications SAC-7 May: 525-533.
- Gomulkiewicz, M., Kutylowski, M. and Wlaz, P. (2006): Fault Jumping Attacks against Shrinking Generator. N. 06111, Dagstuhl Seminar Proceedings.
- GuÄnther, C.G. (1988): Alternating Step Generators Controlled by De Bruijn Sequences. Lecture Notes in Computer Science 304, Springer-Verlag: 5-14.
- Jiang, S. and Gong, G. (2002): On Edit Distance Attack to Alternating Step Generator. Technical Report Corr2002-28, University of Waterloo
- Kanso, A. (2003): Clock-Controlled Shrinking Generator of Feedback Shift Registers. Lecture Notes in Computer Science 2727, Springer-Verlag: 443-451.
- Petrovic, S. and Fúster, A. (2004): Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario. LNCS 3269, Springer-Verlag: 427-439.

#### Paper Citation

#### in Harvard Style

Caballero-Gil P., Fúster-Sabater A. and Hernández-Goya C. (2009). **Deterministic Cryptanalysis of some Stream Ciphers** . In *Proceedings of the 7th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2009)* ISBN 978-989-8111-91-3, pages 16-25. DOI: 10.5220/0002175500160025

#### in Bibtex Style

@conference{wosis09,

author={P. Caballero-Gil and A. Fúster-Sabater and C. Hernández-Goya},

title={Deterministic Cryptanalysis of some Stream Ciphers},

booktitle={Proceedings of the 7th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2009)},

year={2009},

pages={16-25},

publisher={SciTePress},

organization={INSTICC},

doi={10.5220/0002175500160025},

isbn={978-989-8111-91-3},

}

#### in EndNote Style

TY - CONF

JO - Proceedings of the 7th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2009)

TI - Deterministic Cryptanalysis of some Stream Ciphers

SN - 978-989-8111-91-3

AU - Caballero-Gil P.

AU - Fúster-Sabater A.

AU - Hernández-Goya C.

PY - 2009

SP - 16

EP - 25

DO - 10.5220/0002175500160025