New Attack Strategy for the Shrinking Generator

作者:Caballero Gil Pino*; Fuster Sabater Amparo; Eugenia Pazo Robles M
来源:Journal of Research and Practice in Information Technology, 2009, 41(2): 181-190.

摘要

This work shows that the cryptanalysis of the shrinking generator requires fewer intercepted bits than that indicated by the linear complexity. Indeed, whereas the linear complexity of shrunken sequences is between A . 2((S-2)) and A . 2((s-1)), we claim that the initial states of both component registers at-e easily computed with less than A . S shrunken bits. Such a result is proven thanks to the definition of shrunken sequences as interleaved sequences. Consequently, it is conjectured that this statement can be extended to all inter-leaved sequences. Furthermore, this paper confirms that certain bits of the interleaved sequences have a greater strategic importance than others, which may be considered as a proof of weakness of interleaved generators.

  • 出版日期2009-5