期刊文献+

单圈T-函数的2-adic复杂度和1-错2-adic复杂度 被引量:1

The 2-adic complexity and the 1-error 2-adic complexity of single cycle T-functions
下载PDF
导出
摘要 研究了由2nF上单圈T-函数所导出权位序列的2-adic复杂度,设j为整数,0≤j≤n?1。结论表明,第j权位序列2-adic复杂度的上界为2lb(2 1)j?。另外,讨论了与所有单圈T-函数所导出第j权位序列相对应的2-adic整数的分布,分布情况说明这个上界是可以达到的。最后,研究了权位序列的1-错2-adic复杂度。研究结果表明对所有1≤j≤n?1,权位序列jx的1-错2-adic复杂度都与其2-adic复杂度相同。 The 2-adic complexities of the coordinate sequences derived from single cycle T-functions over 2nF were in-vestigated. Let j be an integer such that 0 1≤ j≤n-1. It is shown that the 2-adic complexity of the j th coordinate sequence is upper bounded by lb(2^2′+1). The distribution of the corresponding 2-adic number associated with the j th coordinate sequence of all single cycle T-functions was also discussed, which implies that the upper bound is attainable. Moreover, 1-error 2-adic complexity was also studied. It was proved that the 1-error 2-adic complexity of the j th coor-dinate sequence is equal to its 2-adic complexity except for j=0 .
作者 游伟 戚文峰
出处 《通信学报》 EI CSCD 北大核心 2014年第3期135-139,共5页 Journal on Communications
基金 国家自然科学基金资助项目(61070178)~~
关键词 序列密码 2-adic复杂度 k-错2-adic复杂度 单圈T-函数 权位序列 stream cipher 2-adic complexity k-error 2-adic complexity single cycle T-functions coordinate sequences
  • 相关文献

参考文献11

  • 1COURTOIS N, MEIER W. Algebraic attacks on stream ciphers with linear feedback[A]. Cryptology- EUROCRYPT 2003[C]. Warsaw, Poland,2003.345-359.
  • 2SIEGENTHALER T. Decrypting a class of stream ciphers using ciphertext only[J]. IEEE Transactions on Computers, 1985, C-34(1): 81-85.
  • 3MEIER W, STAFFELBACH O. Fast correlation attacks on certain stream ciphers[J]. Journal of Cryptology, 1989, 1(3): 159-176.
  • 4KLIMOV A, SHAMIR A. A new class of invertible mappings[A]. Workshop on Cryptographic Hardware and Embedded Systems-CHES 2002[C]. Redwood Shores, CA, USA, 2003. 470-483.
  • 5KLAPPER A, GORESKY M. 2-adic shift registers[A]. Fast Software Encryption-FSE I 993[C]. Cambridge, UK, 1993. 174-178.
  • 6KLAPPER A, GORESKY M. Cryptanalysis based on 2-adic rational approximation[A]. Cryptology-CRYPTO 1995[C]. Santa Barbara, California, USA, 1995.262-273.
  • 7KLIMOV A, SHAM1R A. Cryptographic applications ofT-ftmctions[A]. Workshop on Selected Areas in Cryptography-SAC 2003[C]. Ottawa, Canada, 2004. 248-261.
  • 8ZHANG W Y, WU C-K. The algebraic normal form, linear complexity and k-error linear complexity of single-cycle T-ftmction[A]. Sequences and Their Applications-SETA 2006[C]. Beijing, China, 2006. 391-401.
  • 9KLIMOV A, SHAMIR A. New cryptographic primitives based on multiword T-ftmctions[AJ. Fast Software Encryption-FSE 2004[C]. Delhi, India, 2004.1-15.
  • 10KLIMOV A, SHAMIR A. New applications of T-ftmctions in block ciphers and hash ftmctions[A]. Fast Software Encryption-FSE 2005[C]. Paris, France, 2005. 18-31.

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部