Jump to ContentJump to Main Navigation

Annales UMCS, Informatica

The Journal of Maria Curie-Sklodowska University

4 Issues per year


Mathematical Citation Quotient (MCQ) 2014: 0.07

Open Access
VolumeIssuePage

Modified Alternating Step Generators with Non-Linear Scrambler

1Military Communication Institute, Cryptology Department, Zegrze, Poland

© 2014. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 3.0 License. (CC BY-NC-ND 3.0)

Citation Information: Annales UMCS, Informatica. Volume 14, Issue 1, Pages 61–74, ISSN (Online) 2083-3628, DOI: 10.2478/umcsinfo-2014-0003, October 2014

Publication History

Published Online:
2014-10-17

Abstract -

Pseudorandom generators, which produce keystreams for stream ciphers by the exclusiveor sum of outputs of alternately clocked linear feedback shift registers, are vulnerable to cryptanalysis. In order to increase their resistance to attacks, we introduce a non-linear scrambler at the output of these generators. Non-linear feedback shift register plays the role of the scrambler. In addition, we propose Modified Alternating Step Generator with a non-linear scrambler (MASG1S) built with non-linear feedback shift register and regularly or irregularly clocked linear feedback shift registers with non-linear filtering functions

References

  • 1. Berlekamp E. R., Algebraic Coding Theory, Aegean Park Press (1984).

  • 2. Bruijn N. G. de, A combinatorial problem. Indag. Math., 8 (1946): 461-467.

  • 3. Günther C. G., Alternating step generator controlled by de Bruijn sequences, Advances in Cryptology - Eurocrypt’87, LNCS, vol. 304 (1988): 5-14.

  • 4. Johansson T., Reduced complexity correlation attacks on two clock-controlled generators, In Proceedings of Asiacrypt (1998): 342-356.

  • 5. Golic J., Menicocci R., Edit Distance Correlation Attack on the Alternating Step Generator, Advances in Cryptology - Crypto’97, LNCS, vol. 1294, (1997): 499-512.

  • 6. Golic J., Menicocci R., Edit Probability Correlation Attacks on the Alternating Step Generator. Sequences and Their Applications - SETA (1998).

  • 7. Golic J., Menicocci R., Correlation analysis of the Alternating Step Generator. Design, Codes and Cryptography, 31, Kluwer Academic Publishers (2004): 51-74.

  • 8. Al-Hinai S., Batten L., Colbert B., Wong K., Algebraic Attacks on Clock-Controlled Stream Ciphers, LNCS, vol. 4058, Springer (2006): 1-16.

  • 9. Khazaei S., Fisher S., Meier W., Reduced complexity attacks on the alternating step generator, Proceedings of SAC’07, Springer-Verlag (2007): 1-16.

  • 10. Su S., Chiu K., Wuu L., The Cryptanalysis of LFSR/FCSR based alternating step generator, ICCES (2006).

  • 11. Hassanzadeh M. M., Helleseth T., Algebraic attack on the alternating step(r,s) generator, Proceedings of the IEEE International Symposium on Information Theory, IEEE (2010): 2493-2497.

  • 12. Hassanzadeh M. M., Helleseth T., Algebraic attack on the second class of modified alternating k-generators, NISK Conference (2010).

  • 13. Hassanzadeh M. M., Helleseth T., Algebraic attack on the more generalized clock-controlled alternating step generators, Proceeding of SPCOM (2010): 1-5.

  • 14. Kanso A. A., The alternating step(r,s) generator, SECI, Tunis (2002).

  • 15. Kanso A. A., More generalized clock-controlled alternating step generator, Proceedings of ACNS’04, LNCS, vol. 3089 (2004): 326-338.

  • 16. Kanso A. A., Modified clock-controlled alternating step generator, Computer Communications, 32, Elsevier (2009): 787-799.

  • 17. Białota R., Kawa G., Modified alternating k-generators, Design, Codes and Cryptography, 35, Kluwer Academic Publishers (2005): 159-174.

  • 18. Wicik R., Rachwalik T., Modyfikacje generatora z naprzemiennym taktowaniem rejestr´ow, KSTiT, Gda´nsk, Przegląd telekomunikacyjny, nr 8-9/2013 (2013): 1225-1230.

  • 19. Wicik R., Rachwalik T., Modified Alternating Step Generators, MCC, Saint-Malo, France (2013), Military Communications and Information Technology: Recent Advances in Selected Areas, WAT, Warszawa (2013), Cryptology ePrint Arch., 728 (2013).

  • 20. Borowski M., Wicik R., How to speed up a stream cipher, RCMCIS (2002), Biuletyn WIŁ, Zegrze, (2003).

  • 21. Rachwalik T., Szmidt J., Wicik R., Zabłocki J., Generation of nonlinear feedback shift registers with special purpose hardware, MCC, Gda´nsk (2012), Cryptology ePrint Archive, 314 (2012).

  • 22. Szmidt J., Dąbrowski P., Łabuzek G., Rachwalik T., Searching for nonlinear feedback shift registers with parallel computing, MCC, Saint Malo, France (2013), Cryptology ePrint Arch., 542 (2013). [Web of Science]

  • 23. Dąbrowski P., Łabuzek G., Rachwalik T., Szmidt J., Searching for Nonlinear Feedback Shift Registers with Parallel Computing, Information Processing Letters, 114 (2014): 268-272.

  • 24. Menezes A. J., Oorschot P. C. van, Vanstone S. A., Handbook of applied cryptography, CRC Press (1997).

  • 25. Wicik R., Borowski M., Randomness testing of some random and pseudorandom sequences, Military Commu-nication Conference, Prague (2008).

  • 26. Leśniewicz M., Sprzętowa generacja ciąg´ow losowych z przepływnością 100 Mbit/s, Przegląd Telekomunikacyjny - Wiadomości Telekomunikacyjne, nr 11/2011 (2011): 1608-1613.

Comments (0)

Please log in or register to comment.