TY - GEN
T1 - On the security of the gollmann cascades
AU - Park, Sang Joon
AU - Lee, Sangjin
AU - Goh, Seung Cheol
PY - 1995
Y1 - 1995
N2 - The purpose of this paper is to evaluate the security of the Gollmann m-sequence cascades of k stages. We give some theoretical results, which can be utilized to construct the transition matrix T n of the conditional probabilities between the input and output strings of a stage. And then, we describe an attack algorithm for guessing the initial state of the first LFSR with desired reliability, using the transition matrix S n = T n k−1 of the conditional probabilities between the input string of the second stage and the output of the final stage of the given k-stage cascade. We finally evaluate the security of the cascades against this attack. Menicocci recently conjectured that there do not exist the complete analysis of the Gollmann cascades of more than 4 stages and it is infeasible to attack the 10-stage cascades with LFSRs of degree 100. Our experimental results show that the 9-stage cascades with LFSRs of degree 100 are completely breakable and the 10-stage cascades may be insecure.
AB - The purpose of this paper is to evaluate the security of the Gollmann m-sequence cascades of k stages. We give some theoretical results, which can be utilized to construct the transition matrix T n of the conditional probabilities between the input and output strings of a stage. And then, we describe an attack algorithm for guessing the initial state of the first LFSR with desired reliability, using the transition matrix S n = T n k−1 of the conditional probabilities between the input string of the second stage and the output of the final stage of the given k-stage cascade. We finally evaluate the security of the cascades against this attack. Menicocci recently conjectured that there do not exist the complete analysis of the Gollmann cascades of more than 4 stages and it is infeasible to attack the 10-stage cascades with LFSRs of degree 100. Our experimental results show that the 9-stage cascades with LFSRs of degree 100 are completely breakable and the 10-stage cascades may be insecure.
UR - http://www.scopus.com/inward/record.url?scp=84957622876&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84957622876&partnerID=8YFLogxK
U2 - 10.1007/3-540-44750-4_12
DO - 10.1007/3-540-44750-4_12
M3 - Conference contribution
AN - SCOPUS:84957622876
SN - 3540602216
SN - 9783540602217
VL - 963
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 148
EP - 156
BT - Advances in Cryptology ― CRYPTO 1995 - 15th Annual International Cryptology Conference, Proceedings
PB - Springer Verlag
T2 - 15th Annual International Cryptology Conference, CRYPTO 19995
Y2 - 27 August 1995 through 31 August 1995
ER -