期刊文献+

基于FCSR的双滤波密钥流生成器

FCSR-based Keystream Generator with Double-Filters
原文传递
导出
摘要 当前,由于还没有一个适于一般目的的流密码国际加密标准,流密码的设计与分析引起了广泛关注。在以前的流密码的设计中多采用线性反馈移位寄存器(LFSR)作为基本的部件。然而由于LFSR本身的线性性,基于LFSR的流密码备受攻击,进而相继出现了一些替换部件,例如T函数,带进位的反馈移位寄存器(FCSR)等等。文中给出了一个新的基于FCSR的密钥流生成器。理论分析表明该密钥流生成器具有高度的安全性。NIST统计测试表明该密钥流生成器的伪随机特性是理想的。 Since there are no general-purpose international stream cipher encryption standards, much attention has been paid to the design and analysis of stream cipher. Previously, the linear feedback shift register (LFSR) has been widely used as a basic design component. However, quite a few LFSR-based proposals have withstood cryptanalysis for its inherent linear structure. As a result, some alternative constructions have been proposed, such as T function, Feedback with Carry Shift Registers (FCSR) and so on In this paper, a novel FCSR-based stream sequence generator is proposed. Theoretic analysis shows that the proposed keystream generator has high security. And the NIST statistical test indicates that the pseudo-random properties of this novel keystream generator are realtively ideal.
出处 《信息安全与通信保密》 2009年第8期309-312,共4页 Information Security and Communications Privacy
基金 This work was supported in part by a grant from the Major State Basic Research Development Program of China (973 Program) (No. 2007CB311201), and the National Science Foundation of China (No. 60473029, No.60673072).
关键词 密码学 流密码 密钥流生成器 FCSR cryptography stream cioher kevstream generator. FCSR
  • 相关文献

参考文献16

  • 1Golic J. On the security of shift register based keystream generators.Fast Sottware Encryption[C]//Spring-Verlag, LNCS 809, 1994, [s.l.]: Spring-Verlag, 1994:90-100.
  • 2Ruppell R. Analysis and Design of Stream Ciphers[M]. Berlin Heidlberg New York: Springer- Verlag, 1986.
  • 3Courtois N, Meier W. Algebraic Attacks on Stream Ciphers with Linear Feedback [C] //Springer-Verlag, In E. Biham, editor, Advances in Cryptology-Eurocrypt'03, 2003, LNCS 2656, [s.l.]:Spring-Verlag,2003:345-359,.
  • 4Meier W, Staffelbach O. Fast correlations attacks on certain stream ciphers [J]. Journal of Cryptology, 1989, 1 (3): 159-176.
  • 5Siegenthaler T. Correlation-immunity of Nonlinear Combining Functions for Cryptographic Applications[J]. IEEE Transactions on Information Theory, 1984, 30(5): 776-780.
  • 6Klapper A, Goresky M. 2-adic shift registers [C]//Springer-Verlag. Fast Soft-ware Encryption, LNCS 809, 1994, [s.l.]:Spring-Verlag,1994:174- 178.
  • 7Klapper A, Goresky M. Cryptanalysis based on 2-adic rational approximation [C]//Springer-Verlag, Advances in Cryptology- Crypto'95, LNCS 963, 1995, [s.l.]:Spring-Verlag ,1995:262 274.
  • 8Su Shun-lung, Chiu Ko-ming, Wuu Lih-chyau. The cryptanalysis of LFSR/FCSR based alternating step generator[J]IEEE. Computer Engineering and Systems, 2007,02(26): 228-231.
  • 9Zh Tasheva, Bedzhev B, Stoyanov B. N-adic Summation-Shrinking Generator [DB/OL]. [2009-04-01 ] .http://eprint.iaer.org, 2005/068/.
  • 10Zh. Tasheva, B. Bedzhev, B. StoyanoV. Self-Shrinking p-adic Cryptographic Generator[C]//IEEE. XL International Scientific Conference on Information, Communication and Energy Systems and Technologies, ICEST 2005, Nic, Serbia and Montenegro, 2005, [s.l.] :Spring-Verlag,2005:7 - 10.

二级参考文献7

  • 1王锦玲.控制序列的构造与分析[J].信息工程学院学报,1993,12(2):32-38. 被引量:4
  • 2Gong G,QUAN J S.The EditIng Generator and Its Cryptanalysis[EB/OL].http:\\www.cacr.math.uwaterloo.ca.2002 12-28.
  • 3Gong G, Ouan J S. The Editing Generator and Its Cryptanalysis[EB/OL]. http://www cacr. math. uwaterloo. ca, 20(12 : 12-28.
  • 4Rueppel R A. Stream Ciphers[M]. New York :IEEE Press, 1992: 65-134.
  • 5Oppersmith D, Krawczys H, MansourY. The Shrinking Generator[A]. Cryptology-Crypt' 93, Computer Science[C]. New York:Springer Verlag, 1994:22-39.
  • 6王锦玲,陈建梅,苏红.一种新的Shrinking序列周期及线性复杂度[J].信息安全与通信保密,1999,21(4):48-51. 被引量:1
  • 7白恩健,董庆宽,肖国镇.自缩控生成器[J].西安电子科技大学学报,2004,31(2):264-268. 被引量:6

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部