Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 29734


Select areas to restrict search in scientific publication database:
550
Hardware Stream Cipher Based On LFSR and Modular Division Circuit
Abstract:
Proposal for a secure stream cipher based on Linear Feedback Shift Registers (LFSR) is presented here. In this method, shift register structure used for polynomial modular division is combined with LFSR keystream generator to yield a new keystream generator with much higher periodicity. Security is brought into this structure by using the Boolean function to combine state bits of the LFSR keystream generator and taking the output through the Boolean function. This introduces non-linearity and security into the structure in a way similar to the Non-linear filter generator. The security and throughput of the suggested stream cipher is found to be much greater than the known LFSR based structures for the same key length.
Digital Object Identifier (DOI):

References:

[1] W. Meier, and O. Staffelbach , "Fast correlation attacks on stream ciphers, Advances in Cryptology, EUROCRYPT88, Lecture Notes in Computer Science, vol.330, Springer-Verlag, 1988, pp. 301-314.
[2] T. Siegenthaler, "Correlation-immunity of nonlinear combining functions for cryptographic applications", IEEE Trans. on Information Theory, vol. IT 30, 1984,pp. 776- 780.
[3] Mark Goresky, Andrew Klapper, "Algebraic Shift Register Sequences"
[4] Markus Dichtl, "On Nonlinear Filter Generators", Proceedings of Fast Software Encryption Workshop 1997
[5] F. J¨onsson and T. Johansson, A Fast Correlation Attack on LILI-128, Information Processing Letters Vol 81, N. 3, Pages 127-132, 2001.
[6] V. Chepyzhov, T. Johansson, and B. Smeets, A simple algorithm for fast correlation attacks on stream ciphers, Fast Software Encryption, FSE-2000, to appear in Lecture Notes in Computer Science, Springer- Verlag, 2000.
[7] Hugo Krawczyk, "LFSR based hashing and authentication" Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology, Lecture Notes In Computer Science; Vol. 839, pp. 129 - 139, 1994
[8] J. Dj. GoliC and M. MihaljeviC, "A generalized correlation attack on a class of stream ciphers based on the Levenshtein distance", Journal of Cryptology, vo1.3(3), 1991, pp. 201-212.
[9] Patrik Ekdahl, "On LFSR based stream ciphers,analysis and design",Phd Thesis,Department of Information Technology, Lund University, Sweden, October ,2003
[10] V. Chepyzhov and B. Smeets. "On a fast correlation attack on certain stream ciphers" Advances in Cryptology - EUROCRYPT'91, Lecture Notes in Computer Science, no. 547 ,Springer-Verlag, 1991, pp 176- 185.
[11] E. Dawson , L. Simpson, " Analysis and Design Issues for Synchronous Stream Ciphers". Information Security research Centre, Queensland University of Technology.
[12] Sarbani Palit, Bimal K " Some statistical attacks on stream cipher cryptosystems" Journal of Indian Statistical Association, vol.42,May 2004, pp 1-34
[13] T. Johansson and F. Jonsson " Improved fast correlation attack on stream ciphers via convolutional codes" Advances in Cryptology - EUROCRYPT'99, Lecture Notes in Computer Science, no: 1592, Springer-Verlag, 1999,pages 347-362.
[14] P. Sarkar and S. Maitra. Construction of nonlinear Boolean functions with important cryptographic properties. In Advances in Cryptology - EUROCRYPT 2000, LNCS 1807, pages 485-506. Springer Verlag, 2000..
[15] R.A. Rueppel. " Analysis and Design of stream ciphers" Springer- Verlag, 1986.
[16] A. Menezes, P. van Oorschot, and S. Vanstone, "Handbook of Applied Cryptography" CRC Press, 1996.
[17] Harald Niederreiter, "Coding theory and Cryptology," Lecture Notes Series, Institute for Mathematical Sciences, National university of Singapore, Singapore university Press
[18] Jovan Dj Golic, Andrew Clark, and Ed Dawson, "Generalized inversion attack on nonlinear filter generators" IEEE Trans. on Computers, vol. 49, No.10, October 2000, pp. 1100- 1108.
[19] M. Zhang, "Maximum correlation analysis of nonlinear combining functions in stream ciphers.", Journal of Cryptology, vol 13(3), 2000, pp .301-313.
Vol:13 No:06 2019Vol:13 No:05 2019Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007