Выходит 12 номеров в год
ISSN Печать: 0040-2508
ISSN Онлайн: 1943-6009
Indexed in
NONLINEAR FUNCTIONS OF COMPLICATION FOR SYMMETRIC STREAM CIPHERS
Краткое описание
Currently, the nonlinear Boolean functions are being investigated very actively around the world. However, many open questions remain in this area. The theory of nonlinear Boolean functions suitable for use in robust cryptographic algorithms is largely incomplete. Despite the presence of numerous publications on these topics, many issues related to the interrelation of design characteristics affecting the performance of the generator and its cryptographic characteristics are still open. The generation of a special type of sequences, called de Brain sequences, with minimal hardware and software costs, the rationale for their use as non-linear functions of the complexity of stream encryption systems, is the main theme of this work. The paper presents estimates of cryptographic indicators of nonlinear complexity functions of iterative bit sequence generators with various characteristics of the generated sequence, such as linear complexity and autocorrelation.
-
Marcus Schafheutle, A First Report on the Stream Cipher SNOW. http://www.cryptonessie.org.
-
Berbain, C., Billet, O., Canteaut, A., Courtois, N. et al., (2005) , Decim – A new Stream Cipher for Hardware applications, ECRYPT Stream Cipher Project Report 2005/004. Available at: http://www.ecrypt.eu.org/stream/.
-
Kiyomoto, S., Tanaka, T., and Sakurai, K., (2007) , A word-oriented stream cipher using clock control, Workshop Record of SASC, pp.260-274, January 2007 [Electronic resource]. – Available at: https://www.cosic.esat.kuleuven.be/ecrypt/stream/papersdir/2007/029.pdf.
-
The eSTREAM Project – eSTREAM Phase 3. SOSEMANUK (Portfolio Profile 1). [Electronic resource]. – Available at: http://www.ecrypt.eu.org/ stream /sosemanukpf.html.
-
The eSTREAM Project – eSTREAM Phase 3. Grain (Portfolio Profile 2). [Electronic resource]. – Available at: http://www.ecrypt.eu.org/stream/ grainpf.html.
-
The eSTREAM Project – eSTREAM Phase 3. MICKEY (Portfolio Profile 2). [Electronic resource]. – Available at: http://www.ecrypt.eu.org/stream/ mickeypf.html.
-
The eSTREAM Project – eSTREAM Phase 3. Trivium (Portfolio Profile 2). [Electronic resource]. – Available at: http://www.ecrypt.eu.org/stream/triviumpf.html.
-
Dabrowski, P., Łabuzek, G., Rachwalik, T., and Szmidt, J., (2013) , Searching for Nonlinear Feedback Shift Registers with Parallel Computing, [Electronic resource]. URL: https://eprint.iacr.org/2013/542.pdf (accessed on: 07.10.2016).
-
Fredricksen, H.A., (1982) , Survey of full length nonlinear shift register cycle algorithms, SIAM Review, 24(2), pp. 195-221.
-
Jansen, C.J., (1989) , Investigations on Nonlinear Stream Cipher Systems: Construction and Evaluation Methods, Ph.D. Thesis, Technical University of Delft.
-
Jansen, C.J. , The maximum order complexity of sequence ensembles, Lecture Notes in Computer Science, Adv. Cryptology-Eupocrypt’, Berlin, Germany, 547, pp. 153-159.
-
Linardatos, D. and Kalouptsidis, N., (2002) , Synthesis of minimal cost nonlinear feedback shift registers, Signal Process, 82(2), pp. 157-176.
-
Rizomiliotis, P. and Kalouptsidis, N., (2005) , Results on the nonlinear span of binary sequences, IEEE Transactions on Information Theory, 51(4), pp. 1555-5634.
-
Limniotis, K., Kolokotronis, N., and Kalouptsidis, N., (2007) , On the nonlinear complexity and Lempel-Ziv complexity of finite length sequences, IEEE Transactions on Information Theory, 53(11), pp. 4293-4302.
-
Dubrova, E., (2013) , A scalable method for constructing Galois NLFSRs with period 2n-1 using cross-join pairs, IEEE Transactions on Information Theory, 59(1), pp. 703-709.
-
Mykkeltveit, J., Siu, M.-K., and Tong, P., (1979) , On the cyclic structure of some nonlinear shift register sequences, Inform. and Control, 43, pp. 202-215.
-
Carlet, C., Boolean functions for cryptography and error correcting codes, in: Crama, Y., Hammer, P.L. (eds.), Boolean Methods and Models, Cambridge University Press, http://www- rocq.inria.fr/secret/Claude.Carlet/ chap-fcts-Bool.pdf.
-
Knuth, D., (1969) , The Art of Computer Programming. Vol. II. Seminumerical Algorithms, USA, Commonwealth of Massachusetts: Addison-Wesley, 634 p.
-
Flye-Sainte Marie С. , Solution to question number 48, l'Intermediaire des Mathematiciens, 1894, 1, pp. 107-110.
-
de Bruijn, N.G., (1946) , A combitorial problem, Nederl. Akad. Wetensch. Proc. 49, pp. 758-764.
-
Fredricksen, H., (1982) , A survey of full length nonlinear shift register cycle algorithm, SIAM Review, 24(2), pp. 195-221.
-
Mayhew, G.L. and Golomb, S.W., (1992) , Characterizations of generators for modified de Bruijn sequences, Advances in applied mathematics, 13(4), pp. 454-461 https://www.sciencedirect.com/ science/article/pii/019688589290021N.
-
Berlekamp, E.R., (1968) , Algebraic Coding Theory, McGraw-Hill, NY, 474 p.
-
McWilliams, F.J. and Sloane, N.J., (1978) , The Theory of Error-Correcting Codes, North-Holland, 762 p.
-
Mayhew, G.L. and Golomb, S.W., (1990) , Linear spans of modified de Bruijn sequences, IEEE Trans. Inform. Theory, 36(5), pp. 1166-1167.
-
Potii Oleksandr, Poluyanenko Nikolay, Stelnyk Igor, Revak Iryna, Kavun Sergii, Kuznetsova Tetiana, Nonlinear-Feedback Shift Registers for Stream Ciphers, 2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON), 2019. Crossref
-
Potii Oleksandr, Poluyanenko Nikolay, Petrenko Anna, Pidkhomnyi Oleg, Florov Serhii, Kuznetsova Tetiana, Boolean Functions for Stream Ciphers, 2019 IEEE 2nd Ukraine Conference on Electrical and Computer Engineering (UKRCON), 2019. Crossref
-
Kuznetsov Alexandr, Horkovenko Inna, Maliy Olena, Goncharov Nikita, Kuznetsova Tetiana, Kovalenko Nikolaj, Non-Binary Cryptographic Functions for Symmetric Ciphers, 2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T), 2020. Crossref
-
Feng Yelai, Wang Huaixi, Lu Hongyi, Jin Wei, Shu Nina, Security Analysis and Optimization Methods of LSFR Generating Function for MIFARE Classic CARD, 2021 IEEE 4th International Conference on Computer and Communication Engineering Technology (CCET), 2021. Crossref
-
Kuznetsov Alexandr Alexandrovich, Potii Oleksandr Volodymyrovych, Poluyanenko Nikolay Alexandrovich, Gorbenko Yurii Ivanovich, Kryvinska Natalia, Stream Symmetric Cipher “Strumok”, in Stream Ciphers in Modern Real-time IT Systems, 375, 2022. Crossref