Galois generalized matrices in stream ciphers

被引:0
|
作者
Beletsky A.Ya. [1 ]
机构
[1] National Aviation University, 1 Kosmonavt Komarov St., Kyiv
关键词
Galois and fibonacci matrices; Linear feedback shift register; The classical and generalized binary pseudorandom number generators;
D O I
10.1615/TelecomRadEng.v79.i8.20
中图分类号
学科分类号
摘要
The matrix terms Galois and Fibonacci borrowed from the theory of cryptography. These matrices connected by so-called right-hand transposition (a transposing of the relative to the auxiliary diagonal). In cryptography makes extensive use of pseudorandom number generators in Galois and Fibonacci schemes. With the help of these matrices, the same binary sequence can form as the LFSRs generated. In addition to the matrices named in work, other matrices have introduced. These include conjugate matrices Galois and Fibonacci, those created by classical (the left-hand) transpose, inverse to the basis matrices, and those inverse to the conjugate matrices. Traditional pseudorandom number generators have a significant disadvantage, which is that they are subject to the Berlekemp-Messi attack. Two main approaches proposed to prevent such attacks. The first of them assume the change from classical generators to generalized pseudorandom number generators. The second constructive way of protection against the Berlekemp-Messi attack is the construction of generators pseudorandom number based on transformations of similarity of traditional or generalized generators. This study aims to develop algorithms for the synthesis of generalized Galois of the maximum period and to establish interrelationships of Galois matrices. © 2020 Begell House Inc.. All rights reserved.
引用
收藏
页码:649 / 666
页数:17
相关论文
共 50 条
  • [21] Boolean Functions for Stream Ciphers
    Potii, Oleksandr
    Poluyanenko, Nikolay
    Petrenko, Anna
    Pidkhomnyi, Oleg
    Florov, Serhii
    Kuznetsova, Tetiana
    2019 IEEE 2ND UKRAINE CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (UKRCON-2019), 2019, : 942 - 946
  • [22] Stream Ciphers Analysis Methods
    Bucerzan, D.
    Craciun, M.
    Chis, V.
    Ratiu, C.
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2010, 5 (04) : 483 - 489
  • [23] THE STABILITY THEORY OF STREAM CIPHERS
    DING, C
    XIAO, G
    SHAN, W
    LECTURE NOTES IN COMPUTER SCIENCE, 1991, 561 : R3 - +
  • [24] Cellular Automata in Stream Ciphers
    Fuster-Sabater, Amparo
    RECENT TRENDS IN CRYPTOGRAPHY, 2009, 477 : 1 - 20
  • [25] Fault analysis of stream ciphers
    Hoch, JJ
    Shamir, A
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2004, PROCEEDINGS, 2004, 3156 : 240 - 253
  • [26] Stream ciphers: Dead or alive?
    Shamir, A
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2004, PROCEEDINGS, 2004, 3329 : 78 - 78
  • [27] Stream ciphers based on NLFSR
    Soriano, M
    ITS '98 PROCEEDINGS - SBT/IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 1998, : 528 - 533
  • [28] On the use of expansion series for stream ciphers
    Diem, Claus
    LMS JOURNAL OF COMPUTATION AND MATHEMATICS, 2012, 15 : 326 - 340
  • [29] On the security of IV dependent stream ciphers
    Berbain, Come
    Gilbert, Henri
    FAST SOFTWARE ENCRYPTION, 2007, 4593 : 254 - +
  • [30] Cryptanalysis of MICKEY family of stream ciphers
    Ding, Lin
    Guan, Jie
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 936 - 941