Galois generalized matrices in stream ciphers

被引:0
|
作者
Beletsky A.Ya. [1 ]
机构
[1] National Aviation University, 1 Kosmonavt Komarov St., Kyiv
关键词
Galois and fibonacci matrices; Linear feedback shift register; The classical and generalized binary pseudorandom number generators;
D O I
10.1615/TelecomRadEng.v79.i8.20
中图分类号
学科分类号
摘要
The matrix terms Galois and Fibonacci borrowed from the theory of cryptography. These matrices connected by so-called right-hand transposition (a transposing of the relative to the auxiliary diagonal). In cryptography makes extensive use of pseudorandom number generators in Galois and Fibonacci schemes. With the help of these matrices, the same binary sequence can form as the LFSRs generated. In addition to the matrices named in work, other matrices have introduced. These include conjugate matrices Galois and Fibonacci, those created by classical (the left-hand) transpose, inverse to the basis matrices, and those inverse to the conjugate matrices. Traditional pseudorandom number generators have a significant disadvantage, which is that they are subject to the Berlekemp-Messi attack. Two main approaches proposed to prevent such attacks. The first of them assume the change from classical generators to generalized pseudorandom number generators. The second constructive way of protection against the Berlekemp-Messi attack is the construction of generators pseudorandom number based on transformations of similarity of traditional or generalized generators. This study aims to develop algorithms for the synthesis of generalized Galois of the maximum period and to establish interrelationships of Galois matrices. © 2020 Begell House Inc.. All rights reserved.
引用
收藏
页码:649 / 666
页数:17
相关论文
共 50 条
  • [1] Cryptanalysis of the class of maximum period galois NLFSR-based stream ciphers
    Yao, Ge
    Parampalli, Udaya
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2021, 13 (05): : 847 - 864
  • [2] Cryptanalysis of the class of maximum period galois NLFSR-based stream ciphers
    Ge Yao
    Udaya Parampalli
    Cryptography and Communications, 2021, 13 : 847 - 864
  • [3] STREAM CIPHERS
    PIPER, F
    LECTURE NOTES IN COMPUTER SCIENCE, 1983, 149 : 181 - 188
  • [4] Generalized correlation attack on a class of stream ciphers based on the Levenshtein distance
    Golic, Jovan Dj.
    Mihaljevic, Miodrag J.
    Journal of Cryptology, 1991, 3 (03) : 201 - 212
  • [5] STREAM CIPHERS.
    Piper, Fred
    Elektrotechnik und Maschinenbau, 1987, 104 (12): : 564 - 568
  • [6] Stream ciphers and correlation
    Brincat, K
    Piper, FC
    Wild, PR
    DIFFERENCE SETS, SEQUENCES AND THEIR CORRELATION PROPERTIES, 1999, 542 : 17 - 44
  • [7] Kolmogorov Stream Ciphers
    Scharinger, Josef
    COMPUTER AIDED SYSTEMS THEORY - EUROCAST 2009, 2009, 5717 : 1 - 8
  • [8] Probabilistic signature based generalized framework for differential fault analysis of stream ciphers
    Santanu Sarkar
    Prakash Dey
    Avishek Adhikari
    Subhamoy Maitra
    Cryptography and Communications, 2017, 9 : 523 - 543
  • [9] Probabilistic signature based generalized framework for differential fault analysis of stream ciphers
    Sarkar, Santanu
    Dey, Prakash
    Adhikari, Avishek
    Maitra, Subhamoy
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2017, 9 (04): : 523 - 543
  • [10] STOKES MATRICES AND GALOIS-GROUPS OF GENERALIZED CONFLUENT HYPERGEOMETRIC EQUATIONS
    DUVAL, A
    MITSCHI, C
    PACIFIC JOURNAL OF MATHEMATICS, 1989, 138 (01) : 25 - 56