Cryptographic properties of the Welch-Gong transformation sequence generators

被引:44
作者
Gong, G [1 ]
Youssef, AM
机构
[1] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
[2] Cairo Univ, Dept Elect & Commun Engn, Cairo, Egypt
基金
加拿大自然科学与工程研究理事会;
关键词
auto/cross correlation; boolean function; linear span; nonlinearity; pseudorandom sequence (number) generator; r-resilient property; stream cipher;
D O I
10.1109/TIT.2002.804043
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Welch-Gong (WG) transformation sequences are binary sequences of period 2(n) - 1 with two-level autocorrelation. These sequences were discovered by Golomb, Gong, and Gaal in 1998 and they verified the validity of their construction for 5 less than or equal to n less than or equal to 20. Later, No, Chung, and Yun found another way to construct the WG sequences and verified their result for 5 less than or equal to n less than or equal to 23. Dillon first proved this result for odd n in 1998, and, finally, Dobbertin and Dillon proved it for even n in 1999. In this paper, we investigate a two-faced property of the WG transformation sequences for application in stream ciphers and pseudorandom number generators. One is to present the randomness or unpredictability of the WG transformation sequences. The other is to exhibit the security properties of the WG transformations regarded as Boolean functions. In particular, we prove that the WG transformation sequences, in addition to the known two-level autocorrelation and three-level cross correlation with m-sequences, have the ideal 2-tuple distribution, and large linear span increasing exponentially with n. Moreover, it can be implemented efficiently. This is the first type of pseudorandom sequences with good correlation, statistic properties, large linear span, and efficient implementation. When WG transformations are regarded as Boolean functions, they have high nonlinearity. We derive a criterion for the Boolean representation of WG transformations to be r-resilient and show that they are at least I-resilient under some basis of the finite field GF (2(n)). An algorithm to find such bases is given. The degree and linear span of WG transformations are presented as well.
引用
收藏
页码:2837 / 2846
页数:10
相关论文
共 20 条
[1]  
[Anonymous], 1985, LNCS
[2]  
CHANG X, 1994, LECT NOTES COMPUTER, V917, P415
[3]   Multiplicative difference sets via additive characters [J].
Dillon, JF .
DESIGNS CODES AND CRYPTOGRAPHY, 1999, 17 (1-3) :225-235
[4]  
DILLON JF, 1999, NEW CYCLIC DIFFERENC
[6]  
GOLOMB SW, 1982, SHIFT REGISTER SEQUE, P39
[7]   Transform domain analysis of DES [J].
Gong, G ;
Golomb, SW .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (06) :2065-2073
[8]  
Gong G., 1997, P 1997 IEEE INF THEO, P614
[9]  
GONG G, 2000, 200030 CORR U WAT
[10]  
Lidl R., 1983, Encyclopedia of Mathematics and Its Applications