메뉴 건너뛰기




Volumn 36, Issue 1, 2010, Pages 199-212

Encryption System with Variable Number of Registers

Author keywords

Alternating step generator; Cryptography; Feedback shift registers; Security; Stream ciphers

Indexed keywords

ALTERNATING STEP GENERATOR; CRYPTANALYTIC ATTACKS; ENCRYPTION SYSTEM; FEEDBACK FUNCTIONS; FEEDBACK SHIFT REGISTER; HARDWARE IMPLEMENTATIONS; INITIAL STATE; LINEAR COMPLEXITY; PROTECT INFORMATION; SECURITY REQUIREMENTS; STATISTICAL PROPERTIES; STEP GENERATOR; STREAM CIPHERS; VARIABLE NUMBER; WIRELESS COMMUNICATION SYSTEM;

EID: 72449177828     PISSN: 00457906     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.compeleceng.2009.08.005     Document Type: Article
Times cited : (2)

References (56)
  • 1
    • 85034420736 scopus 로고
    • The stop and go generator
    • Advances in cryptology: EUROCRYPT 84, Springer-Verlag, Berlin
    • Beth T., and Piper F. The stop and go generator. Advances in cryptology: EUROCRYPT 84. LNCS vol. 209 (1984), Springer-Verlag, Berlin 88-92
    • (1984) LNCS , vol.209 , pp. 88-92
    • Beth, T.1    Piper, F.2
  • 2
    • 85034847491 scopus 로고
    • Alternating step generators controlled by de Bruijn sequences
    • Advances in cryptology: EUROCRYPT 87, Springer-Verlag, Berlin
    • Gunther C. Alternating step generators controlled by de Bruijn sequences. Advances in cryptology: EUROCRYPT 87. LNCS vol. 309 (1988), Springer-Verlag, Berlin 5-14
    • (1988) LNCS , vol.309 , pp. 5-14
    • Gunther, C.1
  • 3
    • 0023862702 scopus 로고
    • Clock-controlled shift registers in binary sequence generators
    • Chambers W. Clock-controlled shift registers in binary sequence generators. IEE Proc-E 135 (1988) 17-24
    • (1988) IEE Proc-E , vol.135 , pp. 17-24
    • Chambers, W.1
  • 5
    • 84974670663 scopus 로고
    • The shrinking generator
    • Advances in cryptology: CRYPTO 93, Springer-Verlag, Berlin
    • Coppersmith D., Krawczyk H., and Mansour Y. The shrinking generator. Advances in cryptology: CRYPTO 93. LNCS vol. 773 (1994), Springer-Verlag, Berlin 22-39
    • (1994) LNCS , vol.773 , pp. 22-39
    • Coppersmith, D.1    Krawczyk, H.2    Mansour, Y.3
  • 6
    • 0141879159 scopus 로고    scopus 로고
    • A software optimized encryption algorithm
    • Rogaway P., and Coppersmith D. A software optimized encryption algorithm. J Cryptol 11 4 (1998) 273-287
    • (1998) J Cryptol , vol.11 , Issue.4 , pp. 273-287
    • Rogaway, P.1    Coppersmith, D.2
  • 8
    • 0034914280 scopus 로고    scopus 로고
    • An efficient algorithm to generate binary sequences for cryptographic purposes
    • Fuster-Sabater A., and Garcia-Villalba L. An efficient algorithm to generate binary sequences for cryptographic purposes. Theor Comput Sci 259 1-2 (2001) 679-688
    • (2001) Theor Comput Sci , vol.259 , Issue.1-2 , pp. 679-688
    • Fuster-Sabater, A.1    Garcia-Villalba, L.2
  • 9
    • 0035875670 scopus 로고    scopus 로고
    • Stream ciphers for GSM networks
    • Lo C., and Chen Y. Stream ciphers for GSM networks. Comput Commun 24 11 (2001) 1090-1096
    • (2001) Comput Commun , vol.24 , Issue.11 , pp. 1090-1096
    • Lo, C.1    Chen, Y.2
  • 10
    • 84949426591 scopus 로고    scopus 로고
    • Scream: a software-efficient stream cipher
    • Fast software encryption (FSE 02), Springer-Verlag, Berlin
    • Coppersmith D., Halevi S., and Jutla C. Scream: a software-efficient stream cipher. Fast software encryption (FSE 02). LNCS vol. 2365 (2002), Springer-Verlag, Berlin 195-209
    • (2002) LNCS , vol.2365 , pp. 195-209
    • Coppersmith, D.1    Halevi, S.2    Jutla, C.3
  • 12
    • 35048897064 scopus 로고    scopus 로고
    • More generalized alternating step generator
    • ACNS 04, Springer-Verlag, Berlin
    • Kanso A. More generalized alternating step generator. ACNS 04. LNCS vol. 3089 (2004), Springer-Verlag, Berlin 326-338
    • (2004) LNCS , vol.3089 , pp. 326-338
    • Kanso, A.1
  • 13
    • 72449127752 scopus 로고    scopus 로고
    • Hell M, Johansson T, Meier W. Grain - a new stream cipher for constrained environments. ECRYPT Stream Cipher Project Report 2005/001, ; 2005.
    • Hell M, Johansson T, Meier W. Grain - a new stream cipher for constrained environments. ECRYPT Stream Cipher Project Report 2005/001, ; 2005.
  • 14
    • 50849101397 scopus 로고    scopus 로고
    • On the design and implementation of a RISC processor extension for the KASUMI encryption algorithm
    • Balderas-Contreras T., Cumplido R., and Feregrino-Uribe C. On the design and implementation of a RISC processor extension for the KASUMI encryption algorithm. Comput Electr Eng 34 6 (2008) 531-546
    • (2008) Comput Electr Eng , vol.34 , Issue.6 , pp. 531-546
    • Balderas-Contreras, T.1    Cumplido, R.2    Feregrino-Uribe, C.3
  • 15
    • 59649096724 scopus 로고    scopus 로고
    • Implementation and analysis of stream ciphers based on the elliptic curves
    • Deepthi P., Nithin V., and Sathidevi P. Implementation and analysis of stream ciphers based on the elliptic curves. Comput Electr Eng 35 2 (2009) 300-314
    • (2009) Comput Electr Eng , vol.35 , Issue.2 , pp. 300-314
    • Deepthi, P.1    Nithin, V.2    Sathidevi, P.3
  • 16
    • 59649112578 scopus 로고    scopus 로고
    • Design and analysis of a highly secure stream cipher based on linear feedback shift register
    • Deepthi P., John D., and Sathidevi P. Design and analysis of a highly secure stream cipher based on linear feedback shift register. Comput Electr Eng 35 2 (2009) 235-243
    • (2009) Comput Electr Eng , vol.35 , Issue.2 , pp. 235-243
    • Deepthi, P.1    John, D.2    Sathidevi, P.3
  • 17
    • 42649132494 scopus 로고    scopus 로고
    • Investigating some special sequence lengths generated in an external exclusive-NOR type LFSR
    • Ahmad A., and Al-Maashri A. Investigating some special sequence lengths generated in an external exclusive-NOR type LFSR. Comput Electr Eng 34 4 (2008) 270-280
    • (2008) Comput Electr Eng , vol.34 , Issue.4 , pp. 270-280
    • Ahmad, A.1    Al-Maashri, A.2
  • 18
    • 57849105842 scopus 로고    scopus 로고
    • An efficient cryptosystem Delta for stream cipher applications
    • Kanso A. An efficient cryptosystem Delta for stream cipher applications. Comput Electr Eng 35 1 (2008) 126-140
    • (2008) Comput Electr Eng , vol.35 , Issue.1 , pp. 126-140
    • Kanso, A.1
  • 19
    • 57349175668 scopus 로고    scopus 로고
    • New stream ciphers based on elliptic curve point multiplication
    • Deepthi P., and Sathidevi P. New stream ciphers based on elliptic curve point multiplication. Comput Commun 32 1 (2009) 25-33
    • (2009) Comput Commun , vol.32 , Issue.1 , pp. 25-33
    • Deepthi, P.1    Sathidevi, P.2
  • 20
    • 61349134092 scopus 로고    scopus 로고
    • Modified clock-controlled alternating step generators
    • Kanso A. Modified clock-controlled alternating step generators. Comput Commun 32 5 (2009) 787-799
    • (2009) Comput Commun , vol.32 , Issue.5 , pp. 787-799
    • Kanso, A.1
  • 22
    • 0024860262 scopus 로고
    • Fast correlation attacks on certain stream ciphers
    • Meir W., and Staffelbach O. Fast correlation attacks on certain stream ciphers. J Cryptol 1 (1989) 159-176
    • (1989) J Cryptol , vol.1 , pp. 159-176
    • Meir, W.1    Staffelbach, O.2
  • 24
    • 27844468358 scopus 로고    scopus 로고
    • On the efficiency of the clock control guessing attack
    • ICISC 02, Springer-Verlag, Berlin
    • Zenner E. On the efficiency of the clock control guessing attack. ICISC 02. LNCS vol. 2587 (2002), Springer-Verlag, Berlin 200-212
    • (2002) LNCS , vol.2587 , pp. 200-212
    • Zenner, E.1
  • 25
    • 0346602660 scopus 로고
    • On the linear consistency test (LCT) in cryptanalysis with applications
    • CRYPTO 89, Springer-Verlag, Berlin
    • Zeng K., Yang C., and Rao T. On the linear consistency test (LCT) in cryptanalysis with applications. CRYPTO 89. LNCS vol. 435 (1989), Springer-Verlag, Berlin 164-174
    • (1989) LNCS , vol.435 , pp. 164-174
    • Zeng, K.1    Yang, C.2    Rao, T.3
  • 26
    • 24144475860 scopus 로고    scopus 로고
    • A fast correlation attack on the shrinking generator
    • Topics in cryptology: CT-RSA 05, Springer-Verlag, Berlin
    • Zhang B., Wu H., Feng D., and Bao F. A fast correlation attack on the shrinking generator. Topics in cryptology: CT-RSA 05. LNCS vol. 3376 (2005), Springer-Verlag, Berlin 72-86
    • (2005) LNCS , vol.3376 , pp. 72-86
    • Zhang, B.1    Wu, H.2    Feng, D.3    Bao, F.4
  • 27
    • 0025824847 scopus 로고
    • A generalized correlation attack on a class of stream ciphers based on the Levenstein distance
    • Golic J., and Mihaljevic M. A generalized correlation attack on a class of stream ciphers based on the Levenstein distance. J Cryptol 3 (1991) 201-212
    • (1991) J Cryptol , vol.3 , pp. 201-212
    • Golic, J.1    Mihaljevic, M.2
  • 28
    • 84957682296 scopus 로고
    • Towards fast correlation attacks on irregularly clocked shift registers
    • Advances in cryptology: EUROCRYPT 95, Springer-Verlag, Berlin
    • Golic J. Towards fast correlation attacks on irregularly clocked shift registers. Advances in cryptology: EUROCRYPT 95. LNCS vol. 921 (1995), Springer-Verlag, Berlin 248-262
    • (1995) LNCS , vol.921 , pp. 248-262
    • Golic, J.1
  • 29
    • 0021489155 scopus 로고
    • Correlation-immunity of non-linear combining functions for cryptographic applications
    • Siegenthaler T. Correlation-immunity of non-linear combining functions for cryptographic applications. IEEE Trans Inform Theor 30 (1984) 776-780
    • (1984) IEEE Trans Inform Theor , vol.30 , pp. 776-780
    • Siegenthaler, T.1
  • 30
    • 84958673691 scopus 로고    scopus 로고
    • Edit distance correlation attack on the alternating step generator
    • Advances in cryptology: CRYPTO 97, Springer-Verlag, Berlin
    • Golic J., and Menicocci R. Edit distance correlation attack on the alternating step generator. Advances in cryptology: CRYPTO 97. LNCS vol. 1294 (1997), Springer-Verlag, Berlin 499-512
    • (1997) LNCS , vol.1294 , pp. 499-512
    • Golic, J.1    Menicocci, R.2
  • 31
    • 0008796130 scopus 로고    scopus 로고
    • Edit probability correlation attacks on the alternating step generator
    • SETA 98, sequences and their applications, Springer-Verlag, Berlin
    • Golic J., and Menicocci R. Edit probability correlation attacks on the alternating step generator. SETA 98, sequences and their applications. Discrete mathematics and theoretical computer science (1999), Springer-Verlag, Berlin 213-227
    • (1999) Discrete mathematics and theoretical computer science , pp. 213-227
    • Golic, J.1    Menicocci, R.2
  • 32
    • 84974707207 scopus 로고    scopus 로고
    • Real time cryptanalysis of A5/1 on a PC
    • Fast encryption workshop 2000, Springer-Verlag, Berlin
    • Biryukov A., Shamir A., and Wagner D. Real time cryptanalysis of A5/1 on a PC. Fast encryption workshop 2000. LNCS vol. 1978 (2000), Springer-Verlag, Berlin 1-18
    • (2000) LNCS , vol.1978 , pp. 1-18
    • Biryukov, A.1    Shamir, A.2    Wagner, D.3
  • 33
    • 84949223752 scopus 로고    scopus 로고
    • Weaknesses in the key scheduling algorithm of RC4
    • Selected areas in cryptography (SAC 2001), Springer-Verlag, Berlin
    • Fluhrer S., Mantin I., and Shamir A. Weaknesses in the key scheduling algorithm of RC4. Selected areas in cryptography (SAC 2001). LNCS vol. 2259 (2001), Springer-Verlag, Berlin 1-24
    • (2001) LNCS , vol.2259 , pp. 1-24
    • Fluhrer, S.1    Mantin, I.2    Shamir, A.3
  • 34
    • 84958972140 scopus 로고    scopus 로고
    • A practical attack on broadcast RC4
    • Fast software encryption (FSE 2001), Springer-Verlag, Berlin
    • Martin L., and Shamir A. A practical attack on broadcast RC4. Fast software encryption (FSE 2001). LNCS vol. 2355 (2001), Springer-Verlag, Berlin 152-164
    • (2001) LNCS , vol.2355 , pp. 152-164
    • Martin, L.1    Shamir, A.2
  • 35
    • 26444620896 scopus 로고    scopus 로고
    • A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher
    • Fast software encryption (FSE 2004), Springer-Verlag, Berlin
    • Paul S., and Preneel B. A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher. Fast software encryption (FSE 2004). LNCS vol. 3017 (2001), Springer-Verlag, Berlin 245-259
    • (2001) LNCS , vol.3017 , pp. 245-259
    • Paul, S.1    Preneel, B.2
  • 36
  • 38
    • 72449158443 scopus 로고    scopus 로고
    • NIST Special Publication 800-22 Revision 1. A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications, ; 2008.
    • NIST Special Publication 800-22 Revision 1. A statistical test suite for the validation of random number generators and pseudo random number generators for cryptographic applications, ; 2008.
  • 39
    • 0013182351 scopus 로고
    • Using binary derivatives to test an enhancement of DES
    • Carroll J., and Robbins L. Using binary derivatives to test an enhancement of DES. Cryptologia 12 4 (1988) 193-208
    • (1988) Cryptologia , vol.12 , Issue.4 , pp. 193-208
    • Carroll, J.1    Robbins, L.2
  • 40
    • 84937740421 scopus 로고
    • Shift-register synthesis and BCH decoding
    • Massey J. Shift-register synthesis and BCH decoding. IEEE Trans Inform Theor 15 (1969) 122-127
    • (1969) IEEE Trans Inform Theor , vol.15 , pp. 122-127
    • Massey, J.1
  • 41
    • 33746335696 scopus 로고    scopus 로고
    • Algebraic attacks on clock-controlled stream ciphers
    • Information security and privacy, Springer-Verlag, Berlin
    • Al-Hinai S., Batten L., Colbert B., and Wong K. Algebraic attacks on clock-controlled stream ciphers. Information security and privacy. LNCS vol. 4058 (2006), Springer-Verlag, Berlin 1-16
    • (2006) LNCS , vol.4058 , pp. 1-16
    • Al-Hinai, S.1    Batten, L.2    Colbert, B.3    Wong, K.4
  • 42
    • 35248840147 scopus 로고    scopus 로고
    • Algebraic attacks on combiners with memory
    • Advances in cryptology: CRYPTO 03, Springer-Verlag, Berlin
    • Armknecht F., and Krause M. Algebraic attacks on combiners with memory. Advances in cryptology: CRYPTO 03. LNCS vol. 2729 (2003), Springer-Verlag, Berlin 162-175
    • (2003) LNCS , vol.2729 , pp. 162-175
    • Armknecht, F.1    Krause, M.2
  • 43
    • 35248820612 scopus 로고    scopus 로고
    • Algebraic attacks on stream ciphers with linear feedback
    • Advances in cryptology: EUROCRYPT 03, Springer-Verlag, Berlin
    • Courtois N., and Meier W. Algebraic attacks on stream ciphers with linear feedback. Advances in cryptology: EUROCRYPT 03. LNCS vol. 2656 (2003), Springer-Verlag, Berlin 345-359
    • (2003) LNCS , vol.2656 , pp. 345-359
    • Courtois, N.1    Meier, W.2
  • 44
    • 84935039488 scopus 로고    scopus 로고
    • BDD-based cryptanalysis of keystream generators
    • Advances in cryptology: EUROCRYPT 02, Springer-Verlag, Berlin
    • Krause M. BDD-based cryptanalysis of keystream generators. Advances in cryptology: EUROCRYPT 02. LNCS vol. 2332 (2002), Springer-Verlag, Berlin 222-237
    • (2002) LNCS , vol.2332 , pp. 222-237
    • Krause, M.1
  • 45
    • 85028870469 scopus 로고
    • An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure
    • Advances in cryptology: AUSCRYPT 92, Springer-Verlag, Berlin
    • Mihaljevic M. An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure. Advances in cryptology: AUSCRYPT 92. LNCS vol.178 (1993), Springer-Verlag, Berlin 349-356
    • (1993) LNCS , vol.178 , pp. 349-356
    • Mihaljevic, M.1
  • 46
    • 84955576147 scopus 로고
    • On the security of shift register based keystream generators
    • Fast software encryption (FSE 94), Cambridge security workshop, Springer-Verlag, Berlin
    • Golic J. On the security of shift register based keystream generators. Fast software encryption (FSE 94), Cambridge security workshop. LNCS vol. 809 (1994), Springer-Verlag, Berlin 90-100
    • (1994) LNCS , vol.809 , pp. 90-100
    • Golic, J.1
  • 47
    • 84948975118 scopus 로고
    • Embedding probabilistic correlation attacks on clock-controlled shift registers
    • Advances in cryptology: EUROCRYPT 94, Springer-Verlag, Berlin
    • Golic J., and O'Connor L. Embedding probabilistic correlation attacks on clock-controlled shift registers. Advances in cryptology: EUROCRYPT 94. LNCS vol. 950 (1995), Springer-Verlag, Berlin 230-243
    • (1995) LNCS , vol.950 , pp. 230-243
    • Golic, J.1    O'Connor, L.2
  • 48
    • 0008790689 scopus 로고
    • Constrained many-to-one string editing with memory
    • Golic J., and Petrovic S. Constrained many-to-one string editing with memory. Inform Sci 86 1-3 (1995) 61-76
    • (1995) Inform Sci , vol.86 , Issue.1-3 , pp. 61-76
    • Golic, J.1    Petrovic, S.2
  • 49
    • 84947776392 scopus 로고    scopus 로고
    • Reduced complexity correlation attacks on two clock-controlled generators
    • Advances in cryptology: ASIACRYPT 98, Springer-Verlag, Berlin
    • Johansson T. Reduced complexity correlation attacks on two clock-controlled generators. Advances in cryptology: ASIACRYPT 98. LNCS vol.1514 (1998), Springer-Verlag, Berlin 342-356
    • (1998) LNCS , vol.1514 , pp. 342-356
    • Johansson, T.1
  • 50
    • 84957702423 scopus 로고    scopus 로고
    • Improved fast correlation attacks on certain stream ciphers via convolutional codes
    • Advances in cryptology: EUROCRYPT 99, Springer-Verlag, Berlin
    • Johansson T., and Jonsson F. Improved fast correlation attacks on certain stream ciphers via convolutional codes. Advances in cryptology: EUROCRYPT 99. LNCS vol. 1592 (1999), Springer-Verlag, Berlin 347-362
    • (1999) LNCS , vol.1592 , pp. 347-362
    • Johansson, T.1    Jonsson, F.2
  • 51
    • 84974625340 scopus 로고    scopus 로고
    • Fast correlation attacks through reconstruction of linear polynomials
    • Advances in cryptology: CRYPTO 00, Springer-Verlag, Berlin
    • Johansson T., and Jonsson F. Fast correlation attacks through reconstruction of linear polynomials. Advances in cryptology: CRYPTO 00. LNCS vol. 1880 (2000), Springer-Verlag, Berlin 300-315
    • (2000) LNCS , vol.1880 , pp. 300-315
    • Johansson, T.1    Jonsson, F.2
  • 52
    • 0742321821 scopus 로고    scopus 로고
    • Correlation analysis of the alternating step generator
    • Golic J., and Menicocci R. Correlation analysis of the alternating step generator. Design Code Cryptogr 31 1 (2004) 51-74
    • (2004) Design Code Cryptogr , vol.31 , Issue.1 , pp. 51-74
    • Golic, J.1    Menicocci, R.2
  • 53
    • 23744501115 scopus 로고    scopus 로고
    • Embedding probabilities for the alternating step generator
    • Golic J. Embedding probabilities for the alternating step generator. IEEE Trans Inform Theor 51 7 (2005) 2543-2553
    • (2005) IEEE Trans Inform Theor , vol.51 , Issue.7 , pp. 2543-2553
    • Golic, J.1
  • 54
    • 33646825233 scopus 로고    scopus 로고
    • Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks
    • Advances in cryptology: INDOCRYPT 05, Springer-Verlag, Berlin
    • Mihaljevic M., Fossorier M., and Imai H. Cryptanalysis of keystream generator by decimated sample based algebraic and fast correlation attacks. Advances in cryptology: INDOCRYPT 05. LNCS vol. 3797 (2005), Springer-Verlag, Berlin 155-168
    • (2005) LNCS , vol.3797 , pp. 155-168
    • Mihaljevic, M.1    Fossorier, M.2    Imai, H.3
  • 55
    • 72449209394 scopus 로고    scopus 로고
    • Three ways to mount distinguishing attacks on irregularly clocked stream ciphers
    • Englund H., and Johansson T. Three ways to mount distinguishing attacks on irregularly clocked stream ciphers. Int J Secur Netw 1 1-2 (2006) 95-102
    • (2006) Int J Secur Netw , vol.1 , Issue.1-2 , pp. 95-102
    • Englund, H.1    Johansson, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.