LILI Keystream Generator

A family of keystream generators, called the LILI keystream generators, is proposed for use in stream cipher applications and the security of these generators is investigated with respect to currently known attacks. The design is simple and scalable, based on two binary linear feedback shift registers combined in a simple way, using both irregular clocking and nonlinear functions. The design provides the basic security requirements such as a long period and high linear complexity, and is resistant to known cryptanalytic attacks.

[1]  James L. Massey,et al.  Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.

[2]  G. R. BLAKLEY,et al.  A necessary and sufficient condition for fundamental periods of cascade machines to be products of the fundamental periods of their constituent finite state machines , 1981, Inf. Sci..

[3]  Thomas Siegenthaler,et al.  Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.

[4]  Jovan Dj. Golic,et al.  On the linear complexity of nonuniformly decimated PN-sequences , 1988, IEEE Trans. Inf. Theory.

[5]  Chung-Huang Yang,et al.  On the Linear Consistency Test (LCT) in Cryptanalysis with Applications , 1989, CRYPTO.

[6]  Cunsheng Ding,et al.  The Stability Theory of Stream Ciphers , 1991, Lecture Notes in Computer Science.

[7]  Miodrag V. Zivkovic An algorithm for the initial state reconstruction of the clock-controlled shift register , 1991, IEEE Trans. Inf. Theory.

[8]  Jovan Dj. Golic,et al.  A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance , 1992, EUROCRYPT.

[9]  Jovan Dj. Golic,et al.  Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers , 1994, EUROCRYPT.

[10]  Alfredo De Santis,et al.  Advances in Cryptology — EUROCRYPT'94 , 1994, Lecture Notes in Computer Science.

[11]  Ross J. Anderson Searching for the Optimum Correlation Attack , 1994, FSE.

[12]  Jovan Dj. Golic On the Security of Nonlinear Filter Generators , 1996, FSE.

[13]  Jovan Dj. Golic,et al.  Fast Correlation Attacks and Multiple Linear Approximations , 1997, ACISP.

[14]  Leonie Ruth Simpson,et al.  A Probabilistic Correlation Attack on the Shrinking Generator , 1998, ACISP.

[15]  William Millan,et al.  Cryptanalysis of ORYX , 1998, Selected Areas in Cryptography.

[16]  Greg Rose A Stream Cipher Based on Linear Feedback over GF(28) , 1998, ACISP.

[17]  Sarvar Patel,et al.  SOBER Crytanalysis , 1999, FSE.

[18]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[19]  Divide and conquer attacks on shift register based stream ciphers , 2000 .

[20]  Palash Sarkar,et al.  Nonlinearity Bounds and Constructions of Resilient Boolean Functions , 2000, CRYPTO.

[21]  Mihir Bellare Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.

[22]  Rainer A. Rueppel Advances in Cryptology — EUROCRYPT’ 92 , 2001, Lecture Notes in Computer Science.