نتایج جستجو برای: bit swapping linear feedback shift register bs

تعداد نتایج: 830261  

Journal: :IEEE Trans. Computers 1995
Sybille Hellebrand Janusz Rajski Steffen Tarnick Srikanth Venkataraman Bernard Courtois

In this paper, we propose a new scheme for BuiltIn Test (BIT) that uses Multiple-polynomial Linear Feedback Shift Registers (MP-LFSR’s). The same MP-LFSR that generates random patterns to cover easy to test faults is loaded with seeds to generate deterministic vectors for difficult to test faults. The seeds are obtained by solving systems of linear equations involving the seed variables for the...

2003
Frederik Armknecht Matthias Krause

Recently, algebraic attacks were proposed to attack several cryptosystems, e.g. AES, LILI-128 and Toyocrypt. This paper extends the use of algebraic attacks to combiners with memory. A (k, l)-combiner consists of k parallel linear feedback shift registers (LFSRs), and the nonlinear filtering is done via a finite automaton with k input bits and l memory bits. It is shown that for (k, l)-combiner...

Journal: :J. Systems Science & Complexity 2015
Haiyan Wang Jianghua Zhong Dongdai Lin

The Linearization of Nonlinear feedback shift registers (NFSRs) is to find their state transition matrices. In this paper, we investigate the linearization multi-valued NFSRs by considering it as a logical network via a semi-tensor product approach. A new state transition matrix is found for an multi-valued NFSR, which can be simply computed from the truth table of its feedback function, and th...

2002
Hong-Yeop Song HONG-YEOP SONG

Feedback Shift Register (FSR) sequences have been successfully implemented in many communication systems for their randomness properties and ease of implementation. These include ranging and navigation systems, spread spectrum communication systems, CDMA mobile communication systems, and crypto systems such as streamciphers. This article gives a brief overview of FSR sequences, both linear and ...

2005
Frederik Armknecht Willi Meier

Fault attacks are powerful cryptanalytic tools that are applicable to many types of cryptosystems. Recently, general techniques have been developed which can be used to attack many standard constructions of stream ciphers based on LFSR’s. Some more elaborated methods have been invented to attack RC4. These fault attacks are not applicable in general to combiners with memory. In this paper, tech...

2012
Ghenadie Bodean Wajeb Gharibi

In this paper, scan and ring schemes of the pseudo-ring memory self-testing are investigated. Both schemes are based on emulation of the linear or nonlinear feedback shift register by memory itself. Peculiarities of the pseudo-ring schemes implementation for multi-port and embedded memories, and for register file are described. It is shown that only small additional logic is required and allows...

2005
Berndt M. Gammel Rainer Göttfert Oliver Kniffler

We propose a new additive binary stream cipher called Achterbahn. The keystream generator (KSG) consists of eight primitive binary nonlinear feedback shift registers (NLFSR’s). A binary N -stage feedback shift register is called primitive if it has a cycle of length 2N − 1 containing all binary nonzero N tuples. Each shift register has a configurable linear feedforward output function. The outp...

2002
François Arnault Thierry P. Berger Abdelkader Necer

A New Class of Stream Ciphers Combining LFSR and FCSR Architectures 22 François Arnault, Thierry P. Berger, and Abdelkader Necer Slide Attack on Spectr-H64 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34 Selçuk Kavut and Melek D. Yücel On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract) . . . . . . ....

Journal: :IACR Cryptology ePrint Archive 2015
Dibyendu Roy Sourav Mukhopadhyay

LILI-128 is a clock controlled stream cipher based on two LFSRs with one clock control function and one non-linear filter function. The clocking of the second LFSR is controlled by the first LFSR. In this paper we propose a fault algebraic attack on LILI-128 stream cipher. We first recover the state bits of the first LFSR by injecting a single bit fault in the first LFSR. After that we recover ...

Journal: :Eur. J. Comb. 2003
Edwin R. van Dam Dmitry Fon-Der-Flaass

We consider functions on binary vector spaces which are far from linear functions in di erent senses. We compare three existing notions: almost perfect nonlinear (APN) functions, almost bent (AB) functions, and crooked (CR) functions. Such functions are of importance in cryptography because of their resistance to linear and di erential attacks on certain cryptosystems. We give a new combinatori...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید