Some Remarks on the Cross Correlation Analysis of Pseudo Random Generators

نویسندگان

  • Sibylle Mund
  • Dieter Gollmann
  • Thomas Beth
چکیده

Siegenthaler has shown how cross-correlation techniques can be applied to identify pseudo random generators consisting of linear feedback shift registers and a scrambling function 171. These techniques may allow to attack one register in such a generator at a time. The original algorithm needs O(R2'N) operations to identify one register. ( r denotes the length of the register examined, R the number of primitive polynomials of degree r. and N the minimal number of bits one has to observe ). Employing Walsh-Hadamard transform this analysis can be done in O(R(Rr+N)) operations [ 8 ] . We show that there exists a trade-off between the dimension of the Hadamard matrix and the number of bits required to compute the cross correlation coefficients. The complexity of this attack is O(R(r2f-6+26N)). The integer 6 can be selected so that the cost of the attack is minimized. The MSR-generator will serve as an example to demonstrate our algorithm. Furthermore we examine the correlation immunity of the S-boxes used in the DES.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

APPLICATION OF THE RANDOM MATRIX THEORY ON THE CROSS-CORRELATION OF STOCK ‎PRICES

The analysis of cross-correlations is extensively applied for understanding of interconnections in stock markets. Variety of methods are used in order to search stock cross-correlations including the Random Matrix Theory (RMT), the Principal Component Analysis (PCA) and the Hierachical ‎Structures.‎ In ‎this work‎, we analyze cross-crrelations between price fluctuations of 20 ‎company ‎stocks‎...

متن کامل

A Walsh Exploration of Elementary CA Rules

In this paper, we explore the 256 elementary cellular automata rules by a Walsh transform in order to find out correlation-immune rules for generating good pseudo-random sequences. We prove that, except the 8 linear rules, there is no correlation-immune rule among the 256 rules. Thus, Wolfram cellular automata cannot be used as a cryptographic pseudo-random generator since the generated pseudo-...

متن کامل

The use of non-commutative algebra in cryptographically secure pseudo-random number generators

This thesis begins with a general overview of pseudo-random number generators and some of their applications. This thesis then describes their applications to cryptography, and some additional requirements imposed by cryptography. This thesis then provides an introduction to the ring of quaternions, and discusses how they can be included in pseudo-random number generators. Finally, this thesis ...

متن کامل

Using GLFSRs for Pseudo-Random Memory BIST

In this work, we present the application of Generalized Linear Feedback Shift Registers (GLFSRs) for generation of patterns for pseudo-random memory Built-In SelfTest (BIST). Recently, it was shown that using GLFSRs as pattern generators for pseudo-random logic tests can increase the fault coverage noticeably in comparison to standard pseudo-random test pattern generators. Since memory faults d...

متن کامل

On Welch-Gong Transformation Sequence Generators

Welch-Gong (WG) transformation sequences are binary sequences of period 2 − 1 with 2-level auto correlation. These sequences were discovered by Golomb, Gong and Gaal in 1998 and verified for 5 ≤ n ≤ 20. Later on, No, Chung and Yun found another way to construct the WG sequences and verified their result for 5 ≤ n ≤ 23. Dillon first proved this result for odd n in 1998, and finally, Dobbertin an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1987