Galois generalized matrices in stream ciphers

被引:0
|
作者
Beletsky A.Ya. [1 ]
机构
[1] National Aviation University, 1 Kosmonavt Komarov St., Kyiv
关键词
Galois and fibonacci matrices; Linear feedback shift register; The classical and generalized binary pseudorandom number generators;
D O I
10.1615/TelecomRadEng.v79.i8.20
中图分类号
学科分类号
摘要
The matrix terms Galois and Fibonacci borrowed from the theory of cryptography. These matrices connected by so-called right-hand transposition (a transposing of the relative to the auxiliary diagonal). In cryptography makes extensive use of pseudorandom number generators in Galois and Fibonacci schemes. With the help of these matrices, the same binary sequence can form as the LFSRs generated. In addition to the matrices named in work, other matrices have introduced. These include conjugate matrices Galois and Fibonacci, those created by classical (the left-hand) transpose, inverse to the basis matrices, and those inverse to the conjugate matrices. Traditional pseudorandom number generators have a significant disadvantage, which is that they are subject to the Berlekemp-Messi attack. Two main approaches proposed to prevent such attacks. The first of them assume the change from classical generators to generalized pseudorandom number generators. The second constructive way of protection against the Berlekemp-Messi attack is the construction of generators pseudorandom number based on transformations of similarity of traditional or generalized generators. This study aims to develop algorithms for the synthesis of generalized Galois of the maximum period and to establish interrelationships of Galois matrices. © 2020 Begell House Inc.. All rights reserved.
引用
收藏
页码:649 / 666
页数:17
相关论文
共 50 条
  • [31] State Convergence in the Initialisation of Stream Ciphers
    Teo, Sui-Guan
    Al-Hamdan, Ali
    Bartlett, Harry
    Simpson, Leonie
    Wong, Kenneth Koon-Ho
    Dawson, Ed
    INFORMATION SECURITY AND PRIVACY, 2011, 6812 : 75 - 88
  • [32] FASTER ATTACK ON CERTAIN STREAM CIPHERS
    ANDERSON, RJ
    ELECTRONICS LETTERS, 1993, 29 (15) : 1322 - 1323
  • [33] Stream ciphers based on the elliptic curves
    Nithin, V. S.
    Deepthi, P. P.
    Dbanaraj, K. J.
    Sathidevi, R. S.
    ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS, 2007, : 99 - 104
  • [34] A review of some recent stream ciphers
    Kocheta, M.
    Sujatha, N.
    Sivakanya, K.
    Srikanth, R.
    Shetty, Sridhar
    Mohan, P. V. Ananda
    2013 INTERNATIONAL CONFERENCE ON CIRCUITS, CONTROLS AND COMMUNICATIONS (CCUBE), 2013,
  • [35] Recent advances in lightweight stream ciphers
    Akshay Bhasin
    Girish Mishra
    CSI Transactions on ICT, 2016, 4 (2-4) : 173 - 176
  • [36] New correlation attacks on stream ciphers
    Penzhorn, WT
    Bruwer, C
    2002 IEEE AFRICON, VOLS 1 AND 2: ELECTROTECHNOLOGICAL SERVICES FOR AFRICA, 2002, : 203 - 208
  • [37] On effectiveness of clock control in stream ciphers
    Kiyomoto, Shinsaku
    Fukushima, Kazuhide
    Tanaka, Toshiaki
    Sakurai, Kouichi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2007, E90A (09) : 1780 - 1787
  • [38] Concatenated automata in cryptanalysis of stream ciphers
    Fuster-Sabater, A.
    Caballero-Gil, P.
    CELLULAR AUTOMATA, PROCEEDINGS, 2006, 4173 : 611 - 616
  • [39] GOOD STREAM CIPHERS ARE HARD TO DESIGN
    RUEPPEL, RA
    1989 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, 1989, : 163 - 174
  • [40] Towards Low Energy Stream Ciphers
    Banik, Subhadeep
    Mikhalev, Vasily
    Armknecht, Frederik
    Isobe, Takanori
    Meier, Willi
    Bogdanov, Andrey
    Watanabe, Yuhei
    Regazzoni, Francesco
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2018, 2018 (02) : 1 - 19