DOI: 10.1007/978-3-540-68351-3_17
|View full text |Cite
|
Sign up to set email alerts
|

Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
21
0

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 22 publications
(21 citation statements)
references
References 8 publications
0
21
0
Order By: Relevance
“…A ring FCSR can be viewed as a generalization of the Fibonacci and Galois representations. Similar structure has been widely studied for the LFSR case as in [8,9,10], and is a building block of the stream cipher Pomaranch where LFSRs are used [11]. However, we present here for the first time this structure in the FCSR case.…”
Section: Introductionmentioning
confidence: 97%
“…A ring FCSR can be viewed as a generalization of the Fibonacci and Galois representations. Similar structure has been widely studied for the LFSR case as in [8,9,10], and is a building block of the stream cipher Pomaranch where LFSRs are used [11]. However, we present here for the first time this structure in the FCSR case.…”
Section: Introductionmentioning
confidence: 97%
“…The purpose is to destroy the linearity of the LFSR sequences and hence provide the resulting sequence with a large linear complexity. This structure is called a ClockControlled Generator which has several different types, e.g., Stop/Go Generator [2], [3], Step1/Step2 Generator [3], Shrinking Generator [4], Self-Shrinking Generator [5], and Jump Register which is proposed recently in [6]- [8] and it is used in some candidates to the European ECRYPT/eSTREAM [9] project, e.g., Pomaranch [10] and Mickey [11].…”
Section: Introductionmentioning
confidence: 99%
“…The improved attack does NOT require the attacker to scan in any vectors, nor provide any input to the design as required by the scan-attacks on block ciphers. We will introduce the general technique to determine the scan chain structure of several types of LFSRs and follow it up with demonstrating this attack on six LFSR-based stream ciphers DECIM [4], Pomaranch [5], A5/1, A5/2 [6], w7 [7], and LILI II [8].…”
mentioning
confidence: 99%