Galois generalized matrices in stream ciphers

被引:0
|
作者
Beletsky A.Ya. [1 ]
机构
[1] National Aviation University, 1 Kosmonavt Komarov St., Kyiv
关键词
Galois and fibonacci matrices; Linear feedback shift register; The classical and generalized binary pseudorandom number generators;
D O I
10.1615/TelecomRadEng.v79.i8.20
中图分类号
学科分类号
摘要
The matrix terms Galois and Fibonacci borrowed from the theory of cryptography. These matrices connected by so-called right-hand transposition (a transposing of the relative to the auxiliary diagonal). In cryptography makes extensive use of pseudorandom number generators in Galois and Fibonacci schemes. With the help of these matrices, the same binary sequence can form as the LFSRs generated. In addition to the matrices named in work, other matrices have introduced. These include conjugate matrices Galois and Fibonacci, those created by classical (the left-hand) transpose, inverse to the basis matrices, and those inverse to the conjugate matrices. Traditional pseudorandom number generators have a significant disadvantage, which is that they are subject to the Berlekemp-Messi attack. Two main approaches proposed to prevent such attacks. The first of them assume the change from classical generators to generalized pseudorandom number generators. The second constructive way of protection against the Berlekemp-Messi attack is the construction of generators pseudorandom number based on transformations of similarity of traditional or generalized generators. This study aims to develop algorithms for the synthesis of generalized Galois of the maximum period and to establish interrelationships of Galois matrices. © 2020 Begell House Inc.. All rights reserved.
引用
收藏
页码:649 / 666
页数:17
相关论文
共 50 条
  • [41] USING ALGORITHMS AS KEYS IN STREAM CIPHERS
    WAGNER, NR
    PUTTER, PS
    CAIN, MR
    LECTURE NOTES IN COMPUTER SCIENCE, 1986, 219 : 149 - 155
  • [42] An overview of distinguishing attacks on stream ciphers
    Hell, Martin
    Johansson, Thomas
    Brynielsson, Lennart
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2009, 1 (01): : 71 - 94
  • [43] Distinguishing stream ciphers with convolutional filters
    Daemen, Joan
    Van Assche, Gilles
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2006, 4116 : 257 - 270
  • [44] FAST CORRELATION ATTACKS ON STREAM CIPHERS
    MEIER, W
    STAFFELBACH, O
    LECTURE NOTES IN COMPUTER SCIENCE, 1988, 330 : 301 - 314
  • [45] On the use of Egyptian fractions for stream ciphers
    Cherkaoui, I.
    Zinoun, F.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (01): : 139 - 152
  • [46] Deterministic Cryptanalysis of some Stream Ciphers
    Caballero-Gil, P.
    Fuster-Sabater, A.
    Hernandez-Goya, C.
    SECURITY IN INFORMATION SYSTEMS, PROCEEDINGS, 2009, : 16 - +
  • [47] Cryptanalysis of the FLIP Family of Stream Ciphers
    Duval, Sebastien
    Lallemand, Virginie
    Rotella, Yann
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 457 - 475
  • [48] Statistical Cipher Feedback of Stream Ciphers
    Heys, Howard M.
    COMPUTER JOURNAL, 2017, 60 (12): : 1839 - 1851
  • [49] Cryptanalysis of stream ciphers with linear masking
    Coppersmith, D
    Halevi, S
    Jutla, C
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 515 - 532
  • [50] Cryptanalysis on stream ciphers for GSM networks
    Hwang, Ren-Junn
    Su, Feng-Fu
    INTERNATIONAL JOURNAL OF INTERNET PROTOCOL TECHNOLOGY, 2005, 1 (01) : 30 - 33