Correlation Analysis of the Shrinking Generator

The shrinking generator is a well-known keystream generator composed of two linear feedback shift registers, LFSR1 and LFSR2, where LFSR1 is clock-controlled according to regularly clocked LFSR2. A probabilistic analysis of the shrinking generator which shows that this generator can be vulnerable to a specific fast correlation attack is conducted. The first stage of the attack is based on a recursive computation of the posterior probabilites of individual bits of the regularly clocked LFSR1 sequence when conditioned on a given segment of the keystream sequence. Theoretical analysis shows that these probabilities are significantly different from one half and can hence be used for reconstructing the initial state of LFSR1 by iterative probabilistic decoding algorithms for fast correlation attacks on regularly clocked LFSR's. In the second stage of the attack, the initial state of LFSR2 is reconstructed in a similar way, which is based on a recursive computation of the posterior probabilites of individual bits of the LFSR2 sequence when conditioned on the keystream sequence and on the reconstructed LFSR1 sequence.

[1]  Jovan Dj. Golic,et al.  Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers , 1994, EUROCRYPT.

[2]  Thomas Johansson,et al.  Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes , 1999, EUROCRYPT.

[3]  Leonie Ruth Simpson,et al.  A Fast Correlation Attack on Multiplexer Generators , 1999, Inf. Process. Lett..

[4]  Jovan Dj. Golic,et al.  Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence , 1992, EUROCRYPT.

[5]  Jovan Dj. Golic,et al.  A Comparison of Cryptanalytic Principles Based on Iterative Error-Correction , 1991, EUROCRYPT.

[6]  Hugo Krawczyk,et al.  The Shrinking Generator , 1994, CRYPTO.

[7]  Jovan Dj. Golic,et al.  Towards Fast Correlation Attacks on Irregularly Clocked Shift Registers , 1995, EUROCRYPT.

[8]  Joos Vandewalle,et al.  Resynchronization Weaknesses in Synchronous Stream Ciphers , 1994, EUROCRYPT.

[9]  Thomas Johansson Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators , 1998, ASIACRYPT.

[10]  Leonie Ruth Simpson,et al.  A Probabilistic Correlation Attack on the Shrinking Generator , 1998, ACISP.

[11]  Jovan Dj. Golic,et al.  Edit Probability Correlation Attack on the Alternating Step Generator , 1998, SETA.

[12]  Ed Dawson,et al.  Fast Correlation Attacks on the Summation Generator , 2000, Journal of Cryptology.

[13]  Jovan Dj. Golic,et al.  Intrinsic Statistical Weakness of Keystream Generators , 1994, ASIACRYPT.

[14]  J. D. Golic Iterative probabilistic decoding and parity checks with memory , 1999 .

[15]  Hideki Imai,et al.  A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack , 2000, FSE.

[16]  Chung-Huang Yang,et al.  On the Linear Consistency Test (LCT) in Cryptanalysis with Applications , 1989, CRYPTO.