Advertisement

Aspects of Pseudorandomness in Nonlinear Generators of Binary Sequences

  • Amparo Fúster-Sabater
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2841)

Abstract

A method of computing the number of 1 s and 0 s as well as the number of runs of any length in the sequence obtained from a LFSR-based generator has been developed. The procedure that is based on the decomposition of the generating function in global minterms allows one to check balancedness and run distribution goodness in the output sequence. Simple design rules are also derived.

Keywords

Balancedness run distribution minterm stream cipher cryptography 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Golomb, S.W.: Shift Register-Sequences. Aegean Park Press, Laguna Hill (1982)Google Scholar
  2. 2.
    Key, E.L.: An Analysis of the Structure and Complexity of Non-Linear Binary Sequence Generators. IEEE Trans. on Information Theory 22, 732–736 (1976)zbMATHCrossRefGoogle Scholar
  3. 3.
    Klapper, A.: Large Families of Sequences with Near Optimal Correlations and Large Linear Span. IEEE Trans. on Information Theory 42, 1241–1248 (1996)zbMATHCrossRefMathSciNetGoogle Scholar
  4. 4.
    Kumar, P.V., Scholtz, R.A.: Bounds on the Linear Span of Bent Sequences. IEEE Trans. on Information Theory 29, 854–862 (1983)zbMATHCrossRefMathSciNetGoogle Scholar
  5. 5.
    Lidl, R., Niederreiter, H.: Introduction to Finite Fields and Their Applications. Cambridge University Press, Cambridge (1986)zbMATHGoogle Scholar
  6. 6.
    MacWilliams, F.J., Sloane, N.J.: The Theory of Error-Correcting Codes. North-Holland Mathematical Library. Elsevier Science Publishers, Amsterdam (1977)zbMATHGoogle Scholar
  7. 7.
    Mange, D.: Analysis and Synthesis of Logic Systems. Artech House, INC., Norwood (1986)zbMATHGoogle Scholar
  8. 8.
    Meier, W., Staffelbach, O.: Nonlinearity Criteria for Cryptographic Functions. In: Quisquater, J.-J., Vandewalle, J. (eds.) EUROCRYPT 1989. LNCS, vol. 434, pp. 549–563. Springer, Heidelberg (1990)Google Scholar
  9. 9.
    Menezes, A.J., et al.: Handbook of Applied Cryptography. CRC Press, New York (1997)zbMATHGoogle Scholar
  10. 10.
    Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, New York (1986)zbMATHGoogle Scholar
  11. 11.
    Shparlinski, I.E.: On the Linear Complexity of the Power Generator. Design, Codes and Cryptography 23, 5–10 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  12. 12.
    Simmons, G.J. (ed.): Contemporary Cryptology: The Science of Information Integrity. IEEE Press, New York (1991)Google Scholar
  13. 13.
    Tilborg, H.C.: An Introduction to Cryptology. Kluwer Academic Publishers, Norwell (1988)zbMATHGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Amparo Fúster-Sabater
    • 1
  1. 1.Instituto de Física AplicadaC.S.I.C.MadridSpain

Personalised recommendations