Skip to main content

d-Functions in V k (F2) and self-decimation of m-sequences

  • Submitted Contributions
  • Conference paper
  • First Online:
Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC 1991)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 539))

  • 131 Accesses

Abstract

With the purpose of generating, by the help of a single clock-controlled LFSR, a large class of binary sequences strong enough for cryptographic application, an extension class of key-specifiable transfer functions is proposed and analyzed. When tapped as feedforward networks to the LFSR under consideration, these functions will control the stepping of the latter in such a way that its output signals will be decimated pseudo-randomly at a pre-assigned rate. The decimation rate and the length of the LFSR are then suitably selected so that the resulting sequence will have, among others, a large prime period and a linear complexity comparable in order of magnitude to the period. Some conclusions concerning the average and maximal implementable decimation rates are also given.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. R.A. Rueppel, When Shift Registers Clock Themselves, Proc. Eurocrypt'87, Springer-Verlag Lecture Notes in Computer Science, No. 304, 1987.

    Google Scholar 

  2. W.G. Chambers and D. Gollmann, Generators for Sequences with Near-Maximal Linear Equivalence, IEE Proceedings, Vol. 135, Pt. E., No. 1, Jan. 1988.

    Google Scholar 

  3. S. Golomb, Shift Register Sequences, Holden-Day, New York, 1967.

    Google Scholar 

  4. G. Polya and G. Szegö, Aufgaben und Lehrsäze aus der Analys, Dover Publication, New York, 1945.

    Google Scholar 

  5. H. Riesel, Prime Numbers and Computer Methods for Factorizations, Birkhäuser, Boston, Inc., 1985.

    Google Scholar 

  6. K.C. Zeng, C.H. Yang and T.R.N. Rao, Large Primes in Stream Cipher Cryptography, Proc. of Auscrypt'90, Springer-Verlag Lecture Notes in Computer Science, No. 453, New York.

    Google Scholar 

  7. K.C. Zeng, C.H. Yang and T.R.N. Rao, An Improved Linear Syndrome Algorithm in Cryptanalysis with Applications, to appear in Proc. of Crypto'90, Springer-Verlag Lecture Notes in Computer Science.

    Google Scholar 

  8. Don Coppersmith, Fast Evaluation of Logarithms in Fields of Characteristic of Two, IEEE Trans. Information Theory, IT-30, July 1984, pp. 587–594.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Harold F. Mattson Teo Mora T. R. N. Rao

Rights and permissions

Reprints and permissions

Copyright information

© 1991 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zeng, K., Wei, DY., Rao, T.R.N. (1991). d-Functions in V k (F2) and self-decimation of m-sequences. In: Mattson, H.F., Mora, T., Rao, T.R.N. (eds) Applied Algebra, Algebraic Algorithms and Error-Correcting Codes. AAECC 1991. Lecture Notes in Computer Science, vol 539. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-54522-0_134

Download citation

  • DOI: https://doi.org/10.1007/3-540-54522-0_134

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-54522-4

  • Online ISBN: 978-3-540-38436-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics