Aspects of Linearity in Cryptographic Sequence Generators

被引:0
|
作者
Fuster-Sabater, Amparo [1 ]
机构
[1] CSIC, Informat Secur Inst, Madrid 28006, Spain
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2013, PT V | 2013年 / 7975卷
关键词
decimated sequence; linear difference equation; stream cipher; cryptography; SHRINKING GENERATOR;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the present work, it is shown that the sequences obtained from a cryptographic sequence generator, the so-called shrinking generator, are just particular solutions of a kind of linear difference equations. Moreover, all these sequences are simple linear combinations of m-sequences weighted by other primary sequences. This fact establishes a subtle link between irregular decimation and linearity that can be conveniently exploited in the cryptanalysis of such sequence generators. These ideas can be easily extended to other decimation-based cryptographic generators as well as to interleaved sequence generators.
引用
收藏
页码:33 / 47
页数:15
相关论文
共 31 条
  • [1] On the Linearity of Cryptographic Sequence Generators
    Fuster-Sabater, Amparo
    Delgado-Mohatar, Oscar
    Brankovic, Ljiljana
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 2, PROCEEDINGS, 2010, 6017 : 586 - +
  • [2] Linear Solutions for Irregularly Decimated Generators of Cryptographic Sequences
    Fuster-Sabater, A.
    INTERNATIONAL JOURNAL OF NONLINEAR SCIENCES AND NUMERICAL SIMULATION, 2014, 15 (06) : 377 - 385
  • [3] Computing Classes of Cryptographic Sequence Generators
    Fuster-Sabater, A.
    2013 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, 2013, 18 : 2440 - 2443
  • [4] A New Simple Attack on a Wide Class of Cryptographic Sequence Generators
    Cardell, Sara D.
    Fuster-Sabater, Amparo
    Bin, Li
    INTERNATIONAL JOINT CONFERENCE SOCO'17- CISIS'17-ICEUTE'17 PROCEEDINGS, 2018, 649 : 533 - 543
  • [5] Cryptanalytic attack on cryptographic sequence generators:: The class of clock-controlled shrinking generators
    Fuster-Sabater, A.
    Caballero-Gil, P.
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2008, PT 2, PROCEEDINGS, 2008, 5073 : 668 - +
  • [6] Cryptographic properties of the Welch-Gong transformation sequence generators
    Gong, G
    Youssef, AM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2002, 48 (11) : 2837 - 2846
  • [7] Evolving Cryptographic Pseudorandom Number Generators
    Picek, Stjepan
    Sisejkovic, Dominik
    Rozic, Vladimir
    Yang, Bohan
    Jakobovic, Domagoj
    Mentens, Nele
    PARALLEL PROBLEM SOLVING FROM NATURE - PPSN XIV, 2016, 9921 : 613 - 622
  • [8] Cryptographic properties of nonlinear pseudorandom number generators
    Nicholas Kolokotronis
    Designs, Codes and Cryptography, 2008, 46 : 353 - 363
  • [9] Cryptographic properties of nonlinear pseudorandom number generators
    Kolokotronis, Nicholas
    DESIGNS CODES AND CRYPTOGRAPHY, 2008, 46 (03) : 353 - 363
  • [10] Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator
    Cardell, Sara D.
    Fuster-Sabater, Amparo
    Ranea, Adrian H.
    OPEN MATHEMATICS, 2018, 16 : 646 - 655