On effectiveness of clock control in stream ciphers

Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Kouichi Sakurai

Research output: Contribution to journalArticle

2 Citations (Scopus)

Abstract

In this paper, we examine the effectiveness of clock control in protecting stream ciphers from a distinguishing attack, and show that this form of control is effective against such attacks. We model two typical clock-controlled stream ciphers and analyze the increase in computational complexity for these attacks due to clock control. We then analyze parameters for the design of clock-controlled stream ciphers, such as the length of the LFSR used for clock control. By adopting the design criteria described in this paper, a designer can find the optimal length of the clock-control sequence LFSR.

Original languageEnglish
Pages (from-to)1780-1787
Number of pages8
JournalIEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
VolumeE90-A
Issue number9
DOIs
Publication statusPublished - Jan 1 2007

Fingerprint

Stream Ciphers
Clocks
Linear Feedback Shift Register
Distinguishing Attack
Attack
Computational Complexity
Computational complexity

All Science Journal Classification (ASJC) codes

  • Signal Processing
  • Computer Graphics and Computer-Aided Design
  • Electrical and Electronic Engineering
  • Applied Mathematics

Cite this

On effectiveness of clock control in stream ciphers. / Kiyomoto, Shinsaku; Fukushima, Kazuhide; Tanaka, Toshiaki; Sakurai, Kouichi.

In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E90-A, No. 9, 01.01.2007, p. 1780-1787.

Research output: Contribution to journalArticle

Kiyomoto, Shinsaku ; Fukushima, Kazuhide ; Tanaka, Toshiaki ; Sakurai, Kouichi. / On effectiveness of clock control in stream ciphers. In: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. 2007 ; Vol. E90-A, No. 9. pp. 1780-1787.
@article{4a8f78af359748b4ad76b0c7257210ce,
title = "On effectiveness of clock control in stream ciphers",
abstract = "In this paper, we examine the effectiveness of clock control in protecting stream ciphers from a distinguishing attack, and show that this form of control is effective against such attacks. We model two typical clock-controlled stream ciphers and analyze the increase in computational complexity for these attacks due to clock control. We then analyze parameters for the design of clock-controlled stream ciphers, such as the length of the LFSR used for clock control. By adopting the design criteria described in this paper, a designer can find the optimal length of the clock-control sequence LFSR.",
author = "Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka and Kouichi Sakurai",
year = "2007",
month = "1",
day = "1",
doi = "10.1093/ietfec/e90-a.9.1780",
language = "English",
volume = "E90-A",
pages = "1780--1787",
journal = "IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences",
issn = "0916-8508",
publisher = "Maruzen Co., Ltd/Maruzen Kabushikikaisha",
number = "9",

}

TY - JOUR

T1 - On effectiveness of clock control in stream ciphers

AU - Kiyomoto, Shinsaku

AU - Fukushima, Kazuhide

AU - Tanaka, Toshiaki

AU - Sakurai, Kouichi

PY - 2007/1/1

Y1 - 2007/1/1

N2 - In this paper, we examine the effectiveness of clock control in protecting stream ciphers from a distinguishing attack, and show that this form of control is effective against such attacks. We model two typical clock-controlled stream ciphers and analyze the increase in computational complexity for these attacks due to clock control. We then analyze parameters for the design of clock-controlled stream ciphers, such as the length of the LFSR used for clock control. By adopting the design criteria described in this paper, a designer can find the optimal length of the clock-control sequence LFSR.

AB - In this paper, we examine the effectiveness of clock control in protecting stream ciphers from a distinguishing attack, and show that this form of control is effective against such attacks. We model two typical clock-controlled stream ciphers and analyze the increase in computational complexity for these attacks due to clock control. We then analyze parameters for the design of clock-controlled stream ciphers, such as the length of the LFSR used for clock control. By adopting the design criteria described in this paper, a designer can find the optimal length of the clock-control sequence LFSR.

UR - http://www.scopus.com/inward/record.url?scp=57849109568&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=57849109568&partnerID=8YFLogxK

U2 - 10.1093/ietfec/e90-a.9.1780

DO - 10.1093/ietfec/e90-a.9.1780

M3 - Article

AN - SCOPUS:57849109568

VL - E90-A

SP - 1780

EP - 1787

JO - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

JF - IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences

SN - 0916-8508

IS - 9

ER -