Advertisement

Secure Generators of q-Valued Pseudo-random Sequences on Arithmetic Polynomials

  • Oleg FinkoEmail author
  • Sergey Dichenko
  • Dmitry Samoylenko
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 889)

Abstract

A technique for controlling errors in the functioning of nodes for the formation of q-valued pseudo-random sequences (PRS) operating under both random errors and errors generated through intentional attack by an attacker is provided, in which systems of characteristic equations are realized by arithmetic polynomials that allow the calculation process to be parallelized and, in turn, allow the use of redundant modular codes device.

Keywords

q-valued pseudo-random sequences  Secure generators of q-valued pseudo-random sequences  Primitive polynomials  Galois fields  Linear recurrent shift registers  Modular arithmetic  Parallel logical calculations by arithmetic polynomials  Error control of operation  Redundant modular codes 

References

  1. 1.
    Klein, A.: Stream Ciphers. Springer (2013). http://www.springer.com
  2. 2.
    Schneier, B.: Applied Cryptography. Wiley, New York (1996)zbMATHGoogle Scholar
  3. 3.
    Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, Cambridge (1987)zbMATHGoogle Scholar
  4. 4.
    Yang, B., Wu, K., Karri, R.: Scan based side channel attack on data encryption standard. Report 2004(324), 114–116 (2004)Google Scholar
  5. 5.
    Finko, O.A., Dichenko, S.A.: Secure pseudo-random linear binary sequences generators based on arithmetic polynoms. In: Advances in Intelligent Systems and Computing, Soft Computing in Computer and Information Science, vol. 342, pp. 279–290. Springer, Cham (2015)Google Scholar
  6. 6.
    Finko, O.A., Samoylenko, D.V., Dichenko, S.A., Eliseev, N.I.: Parallel generator of \(q\)-valued pseudorandom sequences based on arithmetic polynomials. Przeglad Elektrotechniczny 3, 24–27 (2015)Google Scholar
  7. 7.
    MacWilliams, F., Sloane, N.: Pseudo-random sequences and arrays. Proc. IEEE 64, 1715–1729 (1976)MathSciNetCrossRefGoogle Scholar
  8. 8.
    Canovas, C., Clediere, J.: What do DES S-boxes say in differential side channel attacks? Report 2005(311), 191–200 (2005)Google Scholar
  9. 9.
    Carlier, V., Chabanne, H., Dottax, E.: Electromagnetic side channels of an FPGA implementation of AES. Report 2004(145), 111–124 (2004)Google Scholar
  10. 10.
    Page, D.: Partitioned cache architecture as a side-channel defence mechanism. Report 2005(280), 213–225 (2005)Google Scholar
  11. 11.
    Gutmann, P.: Software generation of random numbers for cryptographic purposes. In: Usenix Security Symposium, pp. 243–25. Usenix Association, Berkeley (1998)Google Scholar
  12. 12.
    Ortega, J.M.: Introduction to Parallel & Vector Solution of Linear Systems. Plenum Press, New York (1988)CrossRefGoogle Scholar
  13. 13.
    Hamming, R.: Coding and Information Theory. Prentice-Hall, Upper Saddle River (1980)Google Scholar
  14. 14.
    Malyugin, V.D.: Representation of boolean functions as arithmetic polynomials. Autom. Remote Control 43(4), 496–504 (1982)MathSciNetzbMATHGoogle Scholar
  15. 15.
    Finko, O.A.: Large systems of Boolean functions: realization by modular arithmetic methods. Autom. Remote Control 65(6), 871–892 (2004)Google Scholar
  16. 16.
    Finko, O.A.: Modular forms of systems of \(k\)-valued functions of the algebra of logic. Autom. Remote Control 66(7), 1081–1100 (2005)Google Scholar
  17. 17.
    Kukharev, G.A., Shmerko, V.P., Zaitseva, E.N.: Algorithms and Systolic Processors of Multivalued Data. Science and Technology, Minsk (1990). (in Russian)Google Scholar
  18. 18.
    Aslanova, N.H., Faradzhev, R.G.: Arithmetic representation of functions of many-valued logic and parallel algorithm for finding such a representation. Autom. Remote Control 53(2), 251–261 (1992)MathSciNetzbMATHGoogle Scholar
  19. 19.
    Omondi, A., Premkumar, B.: Residue Number System: Theory and Implementation. Imperial Collegt Press, London (2007)CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Oleg Finko
    • 1
    Email author
  • Sergey Dichenko
    • 1
  • Dmitry Samoylenko
    • 2
  1. 1.Institute of Computer Systems and Information Security of Kuban State Technological UniversityKrasnodarRussia
  2. 2.Mozhaiskii Military Space AcademySt. PetersburgRussia

Personalised recommendations