On the Security of the Gollmann Cascades

نویسندگان

  • Sangjoon Park
  • Sangjin Lee
  • Seung-Cheol Goh
چکیده

The purpose of this paper is to evaluate the security of the Gollmann m-sequence cascades of k stages. We give some theoretical results, which can be utilized to construct the transition matrix T, of the conditional probabilities between the input and output strings of a stage. And then, we describe an attack algorithm for guessing the initial state of the first LFSR with desired reliability, using the transition matrix S, = T;-' of the conditional probabilities between the input string of the second stage and the output of the final stage of the given kstage cascade. We finally evaluate the security of the cascades against this attack. Menicocci recently conjectured that there do not exist the complete analysis of the Gollmann cascades of more than 4 stages and it is infeasible to attack the 10-stage cascades with LFSRs of degree 100. Our experimental results show that the 9-stage cascades with L F S h of degree 100 are completely breakable and the 10-stage cascades may be insecure. '

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A New Pseudo-Random Generator Based on Gollmann Cascades of Baker-Register-Machines

In this paper, we present a new pseudo-random sequence generator, constructed by the generalized discrete Baker transformation. This new generator is called Cascaded Baker Register Machine (CBRM), which uses the sensitivity of chaotic behaviour and allows the application of automataand shift-register theory. It is shown that a CBRM has good properties of randomness, such as large periods and hi...

متن کامل

Lock-In Effect in Cascades of Clock-Controlled Shift-Registers

Cascaded cryptographic keystream generators as proposed by Gollmann possess a cryptanalytic weakness termed "lock-in'' in this article. If the initial state has been guessed correctly apart from its phase a decryption cascade can be set up in which the effects of each stage of the original cascade are unravelled in reverse order. Once the decryption cascade has "locked in" on the original casca...

متن کامل

Managing Insider Security Threats (MIST 2012 Volume 1)

Insider threats are one of the serious hard problems of organizational security because it is often unclear whether or not an actor is an insider, or what we actually mean by “insider”. In addition, it is frequently almost impossible to verify if an authorized insider action (authorized at the level of an operational policy) would constitute an insider attack contravening the organizational sec...

متن کامل

Rescuing Wireless Sensor Networks Security from Science Fiction

We critically analyze the state of the art in research on wireless sensor network security. Assumptions about security requirements are not always consistent with the assumptions about the nature of sensor nodes. There are deficiencies in the specification of attacker models. Work on wireless sensor network security often fails to give proper definitions and justifications of what constitutes n...

متن کامل

Software Security - The Dangers of Abstraction

Software insecurity can be explained as a potpourri of hacking methods, ranging from the familiar, e.g. buffer overruns, to the exotic, e.g. code insertion with Chinese characters. From such an angle software security would just be a collection of specific countermeasures. We will observe a common principle that can guide a structured presentation of software security and give guidance for futu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995