نتایج جستجو برای: bit swapping linear feedback shift register bs

تعداد نتایج: 830261  

2000

The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently known styles of attack. LILI is simple to implement in hardware or software.

Journal: :IEICE Transactions 2007
Shengqiang Li Zhixiong Chen Rong Sun Guozhen Xiao

The linear complexity and autocorrelation values are very important measures for evaluating the randomness of sequences. The engineering interpretation of linear complexity (LC) is as the length of the shortest linear feedback shift register (LFSR) that generates the sequence. By BerlekampMassey algorithm, if the linear complexity of a key stream is L, then 2L consecutive characters of the sequ...

2003
Chunsheng Liu Krishnendu Chakrabarty

We present a new technique for generating compact dictionaries for cause-effect diagnosis in BIST. This approach relies on the use of three compact dictionaries: (i) D1, containing compacted LFSR signatures for a small number of patterns and faults with high detection probability, (ii) an interval-based pass/fail dictionary D2 for the BIST patterns and for faults with relatively lower detection...

Journal: :IACR Cryptology ePrint Archive 2012
Mohammad Ali Orumiehchiha Josef Pieprzyk Elham Shakour Ron Steinfeld

Rakaposhi is a synchronous stream cipher, which uses three main components a non-linear feedback shift register (NLFSR), a dynamic linear feedback shift register (DLFSR) and a non-linear filtering function (NLF ). NLFSR consists of 128 bits and is initialised by the secret key K. DLFSR holds 192 bits and is initialised by an initial vector (IV ). NLF takes 8-bit inputs and returns a single outp...

2000
E. Dawson A. Clark J. Golić W. Millan L. Penna L. Simpson

The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently known styles of attack. LILI-128 is simple to implement in hardware or software.

Journal: :IEEE Trans. Information Theory 1983
Ehud D. Karnin Martin E. Hellman

combinatorial identity reduces in GF(2) to is periodic with period 2 " , so that Note that 0 % i-2 "-' < 2 "-' 'j + 2 "-', so that the right-hand side of (2) is 0, and (1) becomes, in GF(2), then (d) E B(2) has c(d) = 2-+(s) t R(s)) be a binary vector with associated sequence (s) E B(2 "), n 2 1. Form d = R(s)-L(s), so that (d) E B(2 "-'). a) If d = 0, then c(s) = c(L(s)). b) If d # 0, then c(s...

Journal: :IACR Cryptology ePrint Archive 2002
Gregory G. Rose Philip Hawkes

This paper proposes the Turing stream cipher. Turing offers up to 256-bit key strength, and is designed for extremely efficient software implementation.It combines an LFSR generator based on that of SOBER [21] with a keyed mixing function reminiscent of a block cipher round. Aspects of the block mixer round have been derived from Rijndael [6], Twofish [23], tc24 [24] and SAFER++ [17].

2011
Gautham Sekar

The core of the 3 Generation Partnership Project (3GPP) encryption standard 128-EEA3 is a stream cipher called ZUC. It was designed by the Chinese Academy of Sciences and proposed for inclusion in the cellular wireless standards called “Long Term Evolution” or “4G”. The LFSR-based cipher uses a 128-bit key. In this paper, we first show timing attacks on ZUC that can recover, with about 71.43% s...

2004
Andrew Klapper

Feedback with carry shift registers (FCSRs) are arithmetic analogs of linear feedback shift registers (LFSRs). In this paper we survey some of the basic properties of FCSRs. For comparison, we first review some basic facts about LFSRs. We then define FCSRs and discuss their relation to the N -adic numbers. This leads to the analysis of periodicity of FCSR sequences, their exponential representa...

2005
Anne Canteaut

The recently developed algebraic attacks apply to all keystream generators whose internal state is updated by a linear transition function, including LFSR-based generators. Here, we describe this type of attacks and we present some open problems related to their complexity. We also investigate the design criteria which may guarantee a high resistance to algebraic attacks for keystream generator...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید