On the security of the gollmann cascades

Sang Joon Park, Sangjin Lee, Seung Cheol Goh

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Citations (Scopus)

Abstract

The purpose of this paper is to evaluate the security of the Gollmann m-sequence cascades of k stages. We give some theoretical results, which can be utilized to construct the transition matrix T n of the conditional probabilities between the input and output strings of a stage. And then, we describe an attack algorithm for guessing the initial state of the first LFSR with desired reliability, using the transition matrix S n = T n k−1 of the conditional probabilities between the input string of the second stage and the output of the final stage of the given k-stage cascade. We finally evaluate the security of the cascades against this attack. Menicocci recently conjectured that there do not exist the complete analysis of the Gollmann cascades of more than 4 stages and it is infeasible to attack the 10-stage cascades with LFSRs of degree 100. Our experimental results show that the 9-stage cascades with LFSRs of degree 100 are completely breakable and the 10-stage cascades may be insecure.

Original languageEnglish
Title of host publicationAdvances in Cryptology ― CRYPTO 1995 - 15th Annual International Cryptology Conference, Proceedings
PublisherSpringer Verlag
Pages148-156
Number of pages9
Volume963
ISBN (Print)3540602216, 9783540602217
DOIs
Publication statusPublished - 1995
Externally publishedYes
Event15th Annual International Cryptology Conference, CRYPTO 19995 - Santa Barbara, United States
Duration: 1995 Aug 271995 Aug 31

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume963
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other15th Annual International Cryptology Conference, CRYPTO 19995
Country/TerritoryUnited States
CitySanta Barbara
Period95/8/2795/8/31

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'On the security of the gollmann cascades'. Together they form a unique fingerprint.

Cite this