Cryptography and Shift Registers
نویسندگان
چکیده
Shift registers are at the heart of cryptography and error-correction. In cryptography they are the main tool for generating long pseudorandom binary sequences which can be used as keys for two communicating parties in symmetric cryptography. Practically all military cryptography makes use of them. Shift registers are also fundamental in signal analysis and frequency hopping, most recently in connection with European GPS codes. The subject has a chequered history. One of the pioneers was a famous Hollywood star who, in her day, was known as the worlds most beautiful woman and wrote one of the earliest patents on frequency hopping which was developed by the US military. We speak of the Austrian-born Hedwig Maria Eva Kiesler, otherwise known as Hedy Lamarr. The development of spread spectrum technology was first proposed by Lamarr using frequency hopping. She obtained a patent after coming to Hollywood in 1942 and turned it over to the US government as a contribution to the war effort. Shortly after the patent expired in 1959 Sylvania digitize the synchronization to supply secure communication during the Cuban missile crisis. This paper presents a user-friendly, self-contained and comprehensive discussion of the theory of shift registers. Moreover, we provide several examples (and counterexamples) in support of the theory. In the non-linear case we study the relationship between truth tables and de Bruijn sequences. In the linear case, we use a matrix-theoretic approach to describe the situations when the output is periodic and when it is not periodic. Section three describes additional periodicity properties, using the Cayley-Hamilton theorem and the theory of error-correcting codes. In Section six, we prove a fundamental result to the effect that, for non-singular shift registers of length k, the entire output is uniquely determined by any 2k consecutive bits of the output sequence. Although the result is part of the folk lore, it is certainly not well understood and there appears to be a lack of any rigorous proof in the literature. An additional bonus of our proof here is that it can be adapted to provide a new algorithm for demonstrating a little-known, and remarkable fact. Namely, we provide the most general method for constructing two quite different shift registers of the same length that produce identical output sequences! A new result concerning such shift registers is also sketched in Section six.
منابع مشابه
Register Synthesis for Algebraic Feedback Shift Registers Based on Non-Primes
In this paper, we describe a solution to the register synthesis problem for a class of sequence generators known as Algebraic Feedback Shift Registers. These registers are based on the algebra of π-adic numbers, where π is an element in a ring R, and produce sequences of elements in R/(π). We give several cases where the register synthesis problem can be solved by an efficient algorithm. Conseq...
متن کاملAn iterative algorithm for parametrization of shortest length linear shift registers over finite chain rings
The construction of shortest feedback shift registers for a finite sequence S1, . . . , SN is considered over the finite ring Zpr . A novel algorithm is presented that yields a parametrization of all shortest feedback shift registers for the sequence of numbers S1, . . . , SN , thus solving an open problem in the literature. The algorithm iteratively processes each number, starting with S1, and...
متن کاملOn Feedback Functions of Maximum Length Nonlinear Feedback Shift Registers
Feedback shift registers are basic building blocks for many cryptographic primitives. Due to the insecurities of Linear Feedback Shift Register (LFSR) based systems, the use of Nonlinear Feedback Shift Registers (NFSRs) became more popular. In this work, we study the feedback functions of NFSRs with period 2n. First, we provide two new necessary conditions for feedback functions to be maximum l...
متن کاملFUZZY OBSERVER DESIGN WITH n-SHIFT MULTIPLE KEY FOR CRYPTOGRAPHY BASED ON 3D HYPERCHAOTIC OSCILLATOR
A fuzzy observer based scheme for synchronizing two hyperchaoticoscillators via a scalar transmitted signal for cryptographic application isproposed. The Takagi-Sugeno fuzzy model exactly represents chaotic systems.Based on the general fuzzy model, the fuzzy observer of a chaotic system isdesigned on the basis of the n-shift multiple state based key encryption algorithm.The scalar transmitted s...
متن کاملCryptanalysis of LFSR-based Pseudorandom Generators - a Survey
Pseudorandom generators based on linear feedback shift registers (LFSR) are a traditional building block for cryptographic stream ciphers. In this report, we review the general idea for such generators, as well as the most important techniques of cryptanalysis.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2009