Aspects of Linearity in Cryptographic Sequence Generators

被引:0
|
作者
Fuster-Sabater, Amparo [1 ]
机构
[1] CSIC, Informat Secur Inst, Madrid 28006, Spain
来源
COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2013, PT V | 2013年 / 7975卷
关键词
decimated sequence; linear difference equation; stream cipher; cryptography; SHRINKING GENERATOR;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In the present work, it is shown that the sequences obtained from a cryptographic sequence generator, the so-called shrinking generator, are just particular solutions of a kind of linear difference equations. Moreover, all these sequences are simple linear combinations of m-sequences weighted by other primary sequences. This fact establishes a subtle link between irregular decimation and linearity that can be conveniently exploited in the cryptanalysis of such sequence generators. These ideas can be easily extended to other decimation-based cryptographic generators as well as to interleaved sequence generators.
引用
收藏
页码:33 / 47
页数:15
相关论文
共 50 条
  • [21] Splittable pseudorandom number generators using cryptographic hashing
    1600, Association for Computing Machinery (48):
  • [22] Linear Solutions for Irregularly Decimated Generators of Cryptographic Sequences
    Fuster-Sabater, A.
    INTERNATIONAL JOURNAL OF NONLINEAR SCIENCES AND NUMERICAL SIMULATION, 2014, 15 (06) : 377 - 385
  • [23] Cryptographic Strain-Dependent Light Pattern Generators
    D'Elia, Francesca
    Pisani, Francesco
    Tredicucci, Alessandro
    Pisignano, Dario
    Camposeo, Andrea
    ADVANCED MATERIALS TECHNOLOGIES, 2022, 7 (01)
  • [24] Cryptographic Capabilities of an Ordered System of Generators of a Symmetric Group
    Kalinchuk, S. A.
    Sagalovich, Yu. L.
    JOURNAL OF COMMUNICATIONS TECHNOLOGY AND ELECTRONICS, 2010, 55 (12) : 1485 - 1490
  • [25] Designing cryptographic key generators with low power consumption
    Puczko, M
    Yarmolik, VN
    DELTA 2006: THIRD IEEE INTERNATIONAL WORKSHOP ON ELECTRONIC DESIGN, TEST AND APPLICATIONS, 2006, : 418 - +
  • [26] Splittable Pseudorandom Number Generators using Cryptographic Hashing
    Claessen, Koen
    Palka, Michal H.
    ACM SIGPLAN NOTICES, 2013, 48 (12) : 47 - 58
  • [27] Fully digital random bit generators for cryptographic applications
    Bucci, Marco
    Luzzi, Raimondo
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2008, 55 (03) : 861 - 875
  • [28] INTERESTING SEQUENCE OF FIBONACCI SEQUENCE GENERATORS
    HEED, JJ
    KELLY, L
    FIBONACCI QUARTERLY, 1975, 13 (01): : 29 - 30
  • [29] CRYPTOGRAPHIC ASPECTS OF REAL HYPERELLIPTIC CURVES
    Jacobson, Michael J., Jr.
    Scheidler, Renate
    Stein, Andreas
    CECC '09: 9TH CENTRAL EUROPEAN CONFERENCE ON CRYPTOGRAPHY - TREBIC, 2010, 47 : 31 - +
  • [30] SOME CRYPTOGRAPHIC ASPECTS OF SECURITY AND COMMUNICATION
    MUELLER, KH
    FREQUENZ, 1981, 35 (02) : 41 - 46