Please use this identifier to cite or link to this item:
http://localhost:8081/jspui/handle/123456789/16969
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Chouhan, Anurag | - |
dc.date.accessioned | 2025-06-23T12:09:43Z | - |
dc.date.available | 2025-06-23T12:09:43Z | - |
dc.date.issued | 2015-05 | - |
dc.identifier.uri | http://localhost:8081/jspui/handle/123456789/16969 | - |
dc.description.abstract | In this study, we investigated an attack on LILI- 128 keystream generator which required only 128 bits of the cipher text to be intercepted. We implemented the attack on a scaled down version of LILI- 128 due to hardware constraints. We modeled the scaled down LILI-41 keystream generator with same filter functions as in the original generator. The attacker need to intercept 52 bits (scaled down) of the keystream generator output from which it finds the initial state of both the LFSRs involved in the LILI-41 keystream generator. The results state that though the Attack is practically more feasible as it requires very few intercepted bits but its computational complexity is very high at the same time. The computational complexity achieved for the scaled down version is of the order and in terms of time it takes from few seconds to 5-6 hours, depending on the order in which the states are tried, to crack the initial state, but it definitely cracks. The major weakness of the generator in terms of this attack was analyzed to be the filter function for the clocking LFSR which is then changed and is attacked again, and this time the attack yields no results, hence the LILI generator is modified to resist this attack. | en_US |
dc.description.sponsorship | INDIAN INSTITUTE OF TECHNOLOGY ROORKEE | en_US |
dc.language.iso | en | en_US |
dc.publisher | IIT ROORKEE | en_US |
dc.subject | LILI- 128 Keystream Generator | en_US |
dc.subject | LILI-41 Keystream Generator | en_US |
dc.subject | Scaled Down Version | en_US |
dc.subject | Intercept 52 bits | en_US |
dc.title | THE SHORTER BIT SEQUENCE INTERCEPT ATTACK ON LILI-128 | en_US |
dc.type | Other | en_US |
Appears in Collections: | MASTERS' THESES (E & C) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
G25089.pdf | 6.81 MB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.