Cryptography Reference
In-Depth Information
4. Draw a circuit diagram and verify the output sequence of the LFSR.
2.11.
We want to perform an attack on another LFSR-based stream cipher. In order
to process letters, each of the 26 uppercase letters and the numbers 0, 1, 2, 3, 4, 5
are represented by a 5-bit vector according to the following mapping:
A
↔
0 = 00000
2
.
Z
↔
25 = 11001
2
0
↔
26 = 11010
2
.
5
↔
31 = 11111
2
We happen to know the following facts about the system:
The degree of the LFSR is
m
= 6.
Every message starts with the header
WPI
.
We observe now on the channel the following message (the fourth letter is a
zero):
j5a0edj2b
1. What is the initialization vector?
2. What are the feedback coefficients of the LFSR?
3. Write a program in your favorite programming language which generates the
whole sequence, and find the whole plaintext.
4. Where does the thing after
WPI
live?
5. What type of attack did we perform?
2.12.
Assume the
IV
and the key of Trivium each consist of 80 all-zero bits. Com-
pute the first 70 bits
s
1
,...,
s
70
during the warm-up phase of Trivium. Note that
these are only internal bits which are not used for encryption since the warm-up
phase lasts for 1152 clock cycles.