On the Rate of Coincidence of Two Clock-Controlled Combiners

  • Xuexian Hu
  • Yongtao Ming
  • Wenfen Liu
  • Shiqu Li
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4318)


Clock-Controlled combiner is a common type of keystream generator for stream cipher applications. In this paper, we introduce a kind of probabilistic model for two clock-controlled combiners, and then study the rate of coincidence between the output sequences of these generators and corresponding LFSRs’ sequences. The analysis conducted indicates that these two combiners may be vulnerable to the correlation attacks.


Clock-Controlled Combiner Probabilistic Model Rate of Coincidence 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Beth, T., Piper, F.C.: The stop and go generator. In: Beth, T., Cot, N., Ingemarsson, I. (eds.) EUROCRYPT 1984. LNCS, vol. 209, pp. 88–92. Springer, Heidelberg (1985)CrossRefGoogle Scholar
  2. 2.
    Gollmann, D., Chambers, W.G.: Clock-controlled shift registers: A review. IEEE J. Select. Areas Commun. 7, 525–533 (1989)Google Scholar
  3. 3.
    Canteaut, A., Trabbia, M.: Improved fast correlation attacks using parity-check equations of weight 4 and 5. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 209–221. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  4. 4.
    Johanssson, T., Jonsson, F.: Fast correlation attacks on stream ciphers via convolutional codes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 347–362. Springer, Heidelberg (1999)Google Scholar
  5. 5.
    Johanssson, T.: Reduced complexity correlation attacks on two clock-controlled generators. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 342–357. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  6. 6.
    Golic, J.D.: Embedding and probabilistic correlation attacks on clock-controlled shift registers. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 230–243. Springer, Heidelberg (1995)CrossRefGoogle Scholar
  7. 7.
    Golic, J.D.: Edit probability correlation attacks on stop/go clocked keystream generators. J. Crptology 16(1), 41–68 (2003)zbMATHCrossRefMathSciNetGoogle Scholar
  8. 8.
    Cun-sun, D., Guo-zhen, X.: Stream cipher and its applications, pp. 189–199. National Defense Industrial Press, Beijing (1994) (in Chinese)Google Scholar
  9. 9.
    Shi-qu, L., Xiao-ying, H., Wen-fen, L., et al.: On some probabilistic model in cryptography, pp. 174–190. Publishing House of Electronics Industry, Beijing (2005) (in Chinese)Google Scholar
  10. 10.
    Xiao-ying, H., Yu-zhoung, L., Shi-qu, L.: The question in the conformable probability of the output sequences of the stop-and-go generator. Mathematical Theory and applications 21(1), 79–84 (2001) (in Chinese)MathSciNetGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Xuexian Hu
    • 1
  • Yongtao Ming
    • 1
  • Wenfen Liu
    • 1
  • Shiqu Li
    • 1
  1. 1.Department of Applied MathematicsInformation Engineering UniversityZhengzhouP.R. China

Personalised recommendations