Abs t rac t . A binary stream cipher, known as A5, consisting of three short LFSRs of total length 64 that are mutually clocked in the stop/go manner is cryptanalyzed. It is allegedly used in the GSM standard for digital cellular mobile telephones. Very short keystream sequences are generated from different initial states obtained by combining a 64-bit secret session key and a known 22-bit public key. A basic divide-and-conquer attack recovering the unknown initial state from a known keystream sequence is first introduced. It exploits the specific clocking rule used and has average computational complexity around 240. A time-memory trade-off attack based on the birthday paradox which yields the unknown internal state at a known time for a known keystream sequence is then pointed out. The attack is successful if T . M > 2633.32, where T and M are the required computational time and memory (in 128-bit words), respectively. The precomputation time is O ( M ) and the required number of known keystream sequences generated from different public keys is about T/102. For example, one can choose T x 227.67 and M =: 235.65. To obtain the secret session key from the determined internal state, a so-called internal state reversion attack is proposed and analyzed by the theory of critical and subcritical branching processes.
[1]
T. E. Harris,et al.
The Theory of Branching Processes.
,
1963
.
[2]
Jovan Dj. Golic,et al.
On the Security of Shift Register Based Keystream Generators
,
1993,
FSE.
[3]
Gustavus J. Simmons,et al.
Contemporary Cryptology: The Science of Information Integrity
,
1994
.
[4]
Jovan Dj. Golic,et al.
Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers
,
1995,
EUROCRYPT.
[5]
Jovan Dj. Golic.
Linear Models for Keystream Generators
,
1996,
IEEE Trans. Computers.
[6]
Jovan Dj. Golic.
On the Security of Nonlinear Filter Generators
,
1996,
FSE.
[7]
염흥렬,et al.
[서평]「Applied Cryptography」
,
1997
.
[8]
Jovan Dj. Golic,et al.
Cryptanalysis of Alleged A5 Stream Cipher
,
1997,
EUROCRYPT.
[9]
Ed Dawson,et al.
Generalized Inversion Attack on Nonlinear Filter Generators
,
2000,
IEEE Trans. Computers.