Advertisement

On the uniqueness of a type of cascade connection representations for NFSRs

  • Tian TianEmail author
  • Jia-Min Zhang
  • Wen-Feng Qi
Article
  • 6 Downloads

Abstract

Cascade connection architectures of nonlinear feedback shift registers (NFSRs) have been widely used in cryptography. In particular, the Grain family of stream ciphers uses the cascade connection architecture of an LFSR into an NFSR. A cascade connection representation is not always unique. The nonuniqueness of the representation may threat the security of a cipher. Inspired by the Grain family of stream ciphers, in this paper, we focus on cascade connections of an LFSR into an NFSR. A necessary and sufficient condition for the uniqueness of this class of cascade connection representations is provided under a reasonable condition that the involved NFSR has only trivial cascade connection decompositions. In particular, as a direct application of new results, it is theoretically proved that the cascade connection representation of a Grain-like structure, an n-bit primitive LFSR into an n-bit NFSR with a positive integer n, is unique not considering some trivial distinct representations if the involved n-bit NFSR satisfies the condition. Besides, it is verified that all the main registers used in the Grain family of stream ciphers satisfy the condition.

Keywords

Nonlinear feedback shift registers Cascade connection Grain-like structure 

Mathematics Subject Classification

94A55 94A60 

Notes

References

  1. 1.
    Ågren M., Hell M., Johansson T., Meier W.: Grain-128a: a new version of grain-128 with optional authentication. IJWMC 5(1), 48–59 (2011).CrossRefGoogle Scholar
  2. 2.
    Armknecht F., Mikhalev V.: On lightweight stream ciphers with shorter internal states. In: Leander G. (ed.) Fast Software Encryption–22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015, Revised Selected Papers. Lecture Notes in Computer Science, vol. 9054, pp. 451–470. Springer, New York (2015).Google Scholar
  3. 3.
    Aumasson J., Henzen L., Meier W., Naya-Plasencia M.: Quark: a lightweight hash. J. Cryptol. 26(2), 313–339 (2013).MathSciNetCrossRefzbMATHGoogle Scholar
  4. 4.
    Cannière C.D., Dunkelman O., Knezevic M.: KATAN and KTANTAN—a family of small and efficient hardware-oriented block ciphers. In: Clavier C., Gaj K. (eds.) Cryptographic Hardware and Embedded Systems—CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6–9, 2009, Proceedings, vol. 5747, pp. 272–288. Lecture Notes in Computer ScienceSpringer, New York (2009).Google Scholar
  5. 5.
    Cannière C.D., Preneel B.: Trivium. In: Robshaw M.J.B., Billet O. (eds.) New Stream Cipher Designs—The eSTREAM Finalists. Lecture Notes in Computer Science, vol. 4986, pp. 244–266. Springer, New York (2008).Google Scholar
  6. 6.
    Courtois N., Meier W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham E. (ed.) Advances in Cryptology–EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003. Lecture Notes in Computer Science, vol. 2656, pp. 345–359. Springer, New York (2003).Google Scholar
  7. 7.
    Golomb S.W.: Shift Register Sequences. Aegean Park Press, Laguna Hills (1981).zbMATHGoogle Scholar
  8. 8.
    Hamann M., Krause M., Meier W.: LIZARD—a lightweight stream cipher for power-constrained devices. IACR Trans. Symmetric Cryptol. 2017(1), 45–79 (2017).Google Scholar
  9. 9.
    Hell M., Johansson T., Maximov A., Meier W.: The grain family of stream ciphers. In: Robshaw M.J.B., Billet O. (eds.) New Stream Cipher Designs—The eSTREAM Finalists. Lecture Notes in Computer Science, vol. 4986, pp. 179–190. Springer, New York (2008).Google Scholar
  10. 10.
    Jiang Y., Lin D.: On affine sub-families of grain-like structures. Des. Codes Cryptogr. 82(3), 531–542 (2017).MathSciNetCrossRefzbMATHGoogle Scholar
  11. 11.
    Ma Z., Qi W., Tian T.: On the decomposition of an NFSR into the cascade connection of an NFSR into an LFSR. J. Complex. 29(2), 173–181 (2013).MathSciNetCrossRefzbMATHGoogle Scholar
  12. 12.
    Mikhalev V., Armknecht F., Müller C.: On ciphers that continuously access the non-volatile key. IACR Trans. Symmetric Cryptol. 2016(2), 52–79 (2016).Google Scholar
  13. 13.
    Mykkeltveit J., Siu M., Tong P.: On the cycle structure of some nonlinear shift register sequences. Inf. Control 43(2), 202–215 (1979).CrossRefzbMATHGoogle Scholar
  14. 14.
    Robshaw M.J.B., Billet O. (eds.): New Stream Cipher Designs-The eSTREAM Finalists. Lecture Notes in Computer Science, vol. 4986. Springer, New York (2008).zbMATHGoogle Scholar
  15. 15.
    Zhang J., Qi W., Tian T., Wang Z.: Further results on the decomposition of an NFSR into the cascade connection of an NFSR into an LFSR. IEEE Trans. Inf. Theory 61(1), 645–654 (2015).MathSciNetCrossRefzbMATHGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.National Digital Switching System Engineering & Technological Research CenterZhengzhouChina

Personalised recommendations