• DocumentCode
    1968121
  • Title

    State space cryptanalysis of the MICKEY cipher

  • Author

    Helleseth, Tor ; Jansen, C.J.A. ; Kazymyrov, O. ; Kholosha, A.

  • Author_Institution
    Dept. of Inf., Univ. of Bergen, Bergen, Norway
  • fYear
    2013
  • fDate
    10-15 Feb. 2013
  • Firstpage
    1
  • Lastpage
    10
  • Abstract
    In this paper, we consider the key-stream generator MICKEY, whose internal state splits into two parts that are updated both linearly and nonlinearly while clocking the generator. These state update functions also depend on the internal state of the registers, which perform the so-called self-mutual control. We suggest several attack scenarios based on the reverse clocking of the generator and analysis of the acquired backward states tree. Furthermore, we show meet-in-the-middle attack can be applied while simultaneously allowing the generation of shifted key streams for different pairs of keys and initialization vectors. In practice, our theoretical results are verified by extensive computations.
  • Keywords
    cryptography; trees (mathematics); vectors; MICKEY cipher; attack scenarios; backward states tree; initialization vectors; internal state; meet-in-the-middle attack; mutual irregular clocking keystream generator; reverse clocking; self-mutual control; shifted key streams; state space cryptanalysis; state update functions; Ciphers; Clocks; Complexity theory; Generators; Registers; Vectors;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Information Theory and Applications Workshop (ITA), 2013
  • Conference_Location
    San Diego, CA
  • Print_ISBN
    978-1-4673-4648-1
  • Type

    conf

  • DOI
    10.1109/ITA.2013.6502941
  • Filename
    6502941