Aspects of Linearity in Cryptographic Sequence Generators

被引:0
作者
Fuster-Sabater, Amparo [1 ]
机构
[1] CSIC, Informat Secur Inst, Madrid 28006, Spain
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2013, PT V | 2013年 / 7975卷
关键词
decimated sequence; linear difference equation; stream cipher; cryptography; SHRINKING GENERATOR;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the present work, it is shown that the sequences obtained from a cryptographic sequence generator, the so-called shrinking generator, are just particular solutions of a kind of linear difference equations. Moreover, all these sequences are simple linear combinations of m-sequences weighted by other primary sequences. This fact establishes a subtle link between irregular decimation and linearity that can be conveniently exploited in the cryptanalysis of such sequence generators. These ideas can be easily extended to other decimation-based cryptographic generators as well as to interleaved sequence generators.
引用
收藏
页码:33 / 47
页数:15
相关论文
共 31 条
  • [21] Security of jump controlled sequence generators for stream ciphers
    Helleseth, Tor
    Jansen, Cees J. A.
    Khazaei, Shahram
    Kholosha, Alexander
    SEQUENCES AND THEIR APPLICATIONS - SETA 2006, 2006, 4086 : 141 - 152
  • [22] On the Collision Property of Chaotic Iterations Based Post-Treatments over Cryptographic Pseudorandom Number Generators
    Marangio, Luigi
    Guyeux, Christophe
    Bahi, Jacques M.
    2018 IEEE MIDDLE EAST AND NORTH AFRICA COMMUNICATIONS CONFERENCE (MENACOMM), 2018, : 1 - 6
  • [23] A Chaotic Neural Network Based Cryptographic Pseudo-Random Sequence Design
    Singla, Prateek
    Sachdeva, Payal
    Ahmad, Musheer
    2014 FOURTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATION TECHNOLOGIES (ACCT 2014), 2014, : 301 - 306
  • [24] Efficient RFID authentication protocols based on pseudorandom sequence generators
    Jooyoung Lee
    Yongjin Yeom
    Designs, Codes and Cryptography, 2009, 51 : 195 - 210
  • [25] Efficient RFID authentication protocols based on pseudorandom sequence generators
    Lee, Jooyoung
    Yeom, Yongjin
    DESIGNS CODES AND CRYPTOGRAPHY, 2009, 51 (02) : 195 - 210
  • [26] Design of Decimation-Based Sequence Generators over Extended Fields
    Fuster-Sabater, A.
    Delgado-Mohatar, O.
    COMPUTER AIDED SYSTEMS THEORY, PT 1, 2013, 8111 : 118 - 125
  • [27] A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks
    Lohachab, Ankur
    Lohachab, Anu
    Jangra, Ajay
    INTERNET OF THINGS, 2020, 9
  • [28] Non-singular sequence folding-based pseudorandom key generation algorithm for cryptographic processor
    Pandian, K. K. Soundra
    Ray, Kailash Chandra
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4019 - 4027
  • [30] Evolutionary design of pseudorandom sequence generators based on cellular automata and its applicability in current cryptosystems
    Delgado, David
    Vidal, David
    Hernandez, German
    GECCO 2006: Genetic and Evolutionary Computation Conference, Vol 1 and 2, 2006, : 1859 - 1860