Jaap van Tuyll
Retired cryptanalyst, The Netherlands
Download articlePublished in: Proceedings of the 1st International Conference on Historical Cryptology HistoCrypt 2018
Linköping Electronic Conference Proceedings 149:27, p. 153-158
NEALT Proceedings Series 34:27, p. 153-158
Published: 2018-06-13
ISBN: 978-91-7685-252-1
ISSN: 1650-3686 (print), 1650-3740 (online)
This paper explores the design and strength of a feasible electronic ciphermachine that might have been invented in the 1970’s. The design uses linear feedback shift registers, to get a key generator that satisfies some necessary requirements for a secure cryptographic algorithm. The analysis of the strength however, shows that the algorithm can be attacked successfully.
Solomon W. Golomb. 1967. Shift Register Sequences. Holden–Day.
Auguste Kerckhoffs. 1883. La cryptografie militaire. Journal des Sciences Militaires, IX:5–38, jan.
Willi Meier and Othmar Staffelbach. 1989. Fast Correlation Attacks on certain Stream Ciphers. Journal of Cryptology, 1(3):159–176.