The LILI-128 Keystream Generator

The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently known styles of attack. LILI-128 is simple to implement in hardware or software.

[1]  James L. Massey,et al.  Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.

[2]  G. R. BLAKLEY,et al.  A necessary and sufficient condition for fundamental periods of cascade machines to be products of the fundamental periods of their constituent finite state machines , 1981, Inf. Sci..

[3]  Thomas Siegenthaler,et al.  Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.

[4]  Jovan Dj. Golic,et al.  On the linear complexity of nonuniformly decimated PN-sequences , 1988, IEEE Trans. Inf. Theory.

[5]  F. A. Seiler,et al.  Numerical Recipes in C: The Art of Scientific Computing , 1989 .

[6]  Chung-Huang Yang,et al.  On the Linear Consistency Test (LCT) in Cryptanalysis with Applications , 1989, CRYPTO.

[7]  Cunsheng Ding,et al.  The Stability Theory of Stream Ciphers , 1991, Lecture Notes in Computer Science.

[8]  Miodrag V. Zivkovic An algorithm for the initial state reconstruction of the clock-controlled shift register , 1991, IEEE Trans. Inf. Theory.

[9]  Jovan Dj. Golic,et al.  A Generalized Correlation Attack with a Probabilistic Constrained Edit Distance , 1992, EUROCRYPT.

[10]  Jovan Dj. Golic,et al.  Embedding and Probabilistic Correlation Attacks on Clock-Controlled Shift Registers , 1994, EUROCRYPT.

[11]  Ross J. Anderson Searching for the Optimum Correlation Attack , 1994, FSE.

[12]  Jovan Dj. Golic On the Security of Nonlinear Filter Generators , 1996, FSE.

[13]  Jovan Dj. Golic,et al.  Fast Correlation Attacks and Multiple Linear Approximations , 1997, ACISP.

[14]  Leonie Ruth Simpson,et al.  A Probabilistic Correlation Attack on the Shrinking Generator , 1998, ACISP.

[15]  William Millan,et al.  Cryptanalysis of ORYX , 1998, Selected Areas in Cryptography.

[16]  Greg Rose A Stream Cipher Based on Linear Feedback over GF(28) , 1998, ACISP.

[17]  Divide and conquer attacks on shift register based stream ciphers , 2000 .

[18]  Palash Sarkar,et al.  Nonlinearity Bounds and Constructions of Resilient Boolean Functions , 2000, CRYPTO.

[19]  William Millan,et al.  LILI Keystream Generator , 2000, Selected Areas in Cryptography.