[Resource Topic] 2004/232: Extending the Resynchronization Attack

Welcome to the resource topic for 2004/232

Extending the Resynchronization Attack

Authors: Frederik Armknecht, Joseph Lano, Bart Preneel


Synchronous stream ciphers need perfect synchronization between
sender and receiver. In practical applications, this is ensured by a
resync mechanism. Daemen et al first described attacks on ciphers using such a resync mechanism. In this paper, we extend their attacks in several ways by combining the standard attack with several cryptanalytic techniques such as algebraic attacks and linear cryptanalysis. Our results show that using linear resync mechanisms should be avoided, and give lower bounds for the nonlinearity required from a secure resync mechanism.

ePrint: https://eprint.iacr.org/2004/232

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .