New application methods for word-oriented cryptographic primitives

被引:0
作者
Yang Yang
Guang Zeng
ChengHui Jin
YunYing Qu
机构
[1] Zhengzhou Information Science and Technology Institute,State Key Laboratory of Information Security, Institute of Software
[2] Chinese Academy of Sciences,undefined
来源
Science China Information Sciences | 2012年 / 55卷
关键词
stream cipher; single cycle T-function; linear complexity; -error linear complexity;
D O I
暂无
中图分类号
学科分类号
摘要
Modern software oriented symmetric ciphers have become a key feature in utilizing word-oriented cryptographic primitives. Using the output sequence, in the order of its generation, of a word-oriented cryptographic primitive in the same way as traditional bit-oriented primitives, we can expose the intrinsic weakness of these primitives, especially for word-oriented linear feedback shift registers, T-functions, and so on. Two new methods for using word-oriented cryptographic primitives are presented in this paper, that is, the extracted state method and cascading extracted coordinate method. Using a T-function as an example, we research the different cryptographic properties of the output sequences of the original method and the two proposed methods, focusing mainly on period, linear complexity, and k-error linear complexity. Our conclusions show that the proposed methods could enhance at low cost the cryptographic properties of the output sequence. As a result, since the new methods are simple and easy to implement, they could be used to design new word-oriented cryptographic primitives.
引用
收藏
页码:2149 / 2160
页数:11
相关论文
共 20 条
[1]  
Wang L. P.(2011)On minimal polynomials over Finite Fields Appl 17 294-301
[2]  
Gao Z. H.(2010) and over Theor Comput Sci 411 3883-3893
[3]  
Fu F. W.(2011) of a finite length sequence over IEEE Trans Inf Theory 57 8095-8113
[4]  
Arnault F.(2011)The minimal polynomial of a sequence obtained from the componentwise linear transformation of a linear recurring sequence Des Codes Cryptogr 58 123-134
[5]  
Berger T.(2002)Revisiting LFSRs for Cryptographic Applications Discret Math Appl 12 527-590
[6]  
Minier M.(2006)Primitive polynomials, singer cycles and word-oriented linear feedback shift registers IEEE Trans Inf Theory 52 5151-5157
[7]  
Sudhir R. G.(2008)Uniformly distributed sequences over Des Codes Cryptogr 46 353-363
[8]  
Sartaj U. H.(2008)-adic integers, II J Beijing Univ Posts Telecommun 31 62-65
[9]  
Meena K.(1983)Linear properties in T-functions IEEE Trans Inf Theory 29 144-146
[10]  
Anashin V.(2000)Cryptographic properties of nonlinear pseudorandom number generators IEEE Trans Inf Theory 46 694-698