نتایج جستجو برای: bit swapping linear feedback shift register bs
تعداد نتایج: 830261 فیلتر نتایج به سال:
The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently known styles of attack. LILI is simple to implement in hardware or software.
The linear complexity and autocorrelation values are very important measures for evaluating the randomness of sequences. The engineering interpretation of linear complexity (LC) is as the length of the shortest linear feedback shift register (LFSR) that generates the sequence. By BerlekampMassey algorithm, if the linear complexity of a key stream is L, then 2L consecutive characters of the sequ...
We present a new technique for generating compact dictionaries for cause-effect diagnosis in BIST. This approach relies on the use of three compact dictionaries: (i) D1, containing compacted LFSR signatures for a small number of patterns and faults with high detection probability, (ii) an interval-based pass/fail dictionary D2 for the BIST patterns and for faults with relatively lower detection...
Rakaposhi is a synchronous stream cipher, which uses three main components a non-linear feedback shift register (NLFSR), a dynamic linear feedback shift register (DLFSR) and a non-linear filtering function (NLF ). NLFSR consists of 128 bits and is initialised by the secret key K. DLFSR holds 192 bits and is initialised by an initial vector (IV ). NLF takes 8-bit inputs and returns a single outp...
The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently known styles of attack. LILI-128 is simple to implement in hardware or software.
combinatorial identity reduces in GF(2) to is periodic with period 2 " , so that Note that 0 % i-2 "-' < 2 "-' 'j + 2 "-', so that the right-hand side of (2) is 0, and (1) becomes, in GF(2), then (d) E B(2) has c(d) = 2-+(s) t R(s)) be a binary vector with associated sequence (s) E B(2 "), n 2 1. Form d = R(s)-L(s), so that (d) E B(2 "-'). a) If d = 0, then c(s) = c(L(s)). b) If d # 0, then c(s...
This paper proposes the Turing stream cipher. Turing offers up to 256-bit key strength, and is designed for extremely efficient software implementation.It combines an LFSR generator based on that of SOBER [21] with a keyed mixing function reminiscent of a block cipher round. Aspects of the block mixer round have been derived from Rijndael [6], Twofish [23], tc24 [24] and SAFER++ [17].
The core of the 3 Generation Partnership Project (3GPP) encryption standard 128-EEA3 is a stream cipher called ZUC. It was designed by the Chinese Academy of Sciences and proposed for inclusion in the cellular wireless standards called “Long Term Evolution” or “4G”. The LFSR-based cipher uses a 128-bit key. In this paper, we first show timing attacks on ZUC that can recover, with about 71.43% s...
Feedback with carry shift registers (FCSRs) are arithmetic analogs of linear feedback shift registers (LFSRs). In this paper we survey some of the basic properties of FCSRs. For comparison, we first review some basic facts about LFSRs. We then define FCSRs and discuss their relation to the N -adic numbers. This leads to the analysis of periodicity of FCSR sequences, their exponential representa...
The recently developed algebraic attacks apply to all keystream generators whose internal state is updated by a linear transition function, including LFSR-based generators. Here, we describe this type of attacks and we present some open problems related to their complexity. We also investigate the design criteria which may guarantee a high resistance to algebraic attacks for keystream generator...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید