Abstract
One important area where sequences find application is cryptography. In the modern electronic era information is stored, processed and transmitted encoded as binary sequences. The automated business environment places great value on this information and it is vital that it is protected. This is often best done by cryptographic means and one such method uses bitwise addition of pseudo-random sequences to the encoded information in order to hide its contents.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Beker, H. and Piper, F. (1982) Cipher Systems, Northwood Books, London.
Berlekamp, E.R. (1968) Algebraic Coding Theory, McGraw-Hill, New York.
Beth, T. and Piper, F. (1985) The stop-and-go generator, in T. Beth, N. Cot and I. Ingemarsson (eds.), Advances in Cryptology: Proc. Eurocrypt ‘84,Lecture Notes in Computer Science 219, Springer, Berlin, pp.88–92.
Blaser, W. and Heinzmann, P. (1982) New cryptographic device with high security using public key distribution, Proc. IEEE Student Paper Contest 1979–1980, pp.145–53.
Brynielsson, L. (1989) A short proof of the Xiao-Massey Lemma, IEEE Trans. Inform. Theory 35, 1344.
Chepyzhov, V. and Smeets, B. (1991) On a fast correlation attack on certain stream ciphers, in D.W. Davies (ed.), Advances in Cryptology: Eurocrypt ‘81, Lecture Notes in Computer Science 547, Springer, Berlin, pp.176–185.
Coppersmith, D. (1984) Fast evaluation of logarithms in fields of characteristic two, IEEE Trans. Inform. Theory 30, 587–594.
Forre, R. (1989) A fast correlation attack on nonlinearly feedforward filtered shift-register sequences, in J.-J. Quisquater and J. Vandewalle (eds.), Advances in Cryptology: Eurocrypt ‘89, Lecture Notes in Computer Science 434, Springer, Berlin, pp.586–595.
Gallager, R.G. (1963) Low-Density Parity-Check Codes, MIT Press, Cambridge, Massachusetts.
Geffe, P.R. (1973) How to protect data with ciphers that are really hard to break, Electronics 4, 99–101.
Golic, J.D. (1989) On the linear complexity of functions of periodic GF(q)-sequences, IEEE Trans. Inform. Theory 35, 69–75.
Golomb, S.W. (1967) Shift Register Sequences, San Francisco, Holden Day.
Herlestam, T. (1982) On the complexity of functions of linear shift register sequences, presented at IEEE Int. Symp. Info. Theory, Les Arc, France.
Herlestam, T. (1986) On functions of linear shift register sequences, in F. Pichler (ed.), Advances in Cryptology: Proc. of Eurocrypt ‘85, Lecture Notes in Computer Science 219, Springer, Berlin, pp.119–129.
Key, E.L. (1976) An analysis of the structure and complexity of nonlinear binary sequence generators, IEEE Trans. Inform. Theory 22, 732–763.
Massey, J.L. (1969) Shift-register synthesis and BCH decoding, IEEE Trans. Inform. Theory 15, 122–127.
Meier, W. and Staffelbach, O. (1989a) Fast correlation attacks on certain stream ciphers, J. Cryptology 1, 159–176.
Meier, W. and Staffelbach, O. (1989b) Non-linearity criteria for cryptographic functions, in J.-J. Quisquater and J. Vandewalle (eds.), Advances in Cryptology: Eurocrypt ‘89, Lecture Notes in Computer Science 434, Springer, Berlin, pp.549–562.
Meier, W. and Staffelbach, O. (1990) Correlation properties of combiners with memory in stream ciphers, in I. Damgard (ed.), Advances in Cryptology - Eurocrypt ‘80 Lecture Notes in Computer Science 473, Springer, Berlin, pp.204–213.
Menezes, A.J., van Oorschot, P.C. and Vanstone, S.A. (1997) Handbook of Applied Cryptography, CRC Press, New York.
Robshaw, M. (1995) Stream Ciphers, RSA Labs Tech. Report TR-701.
Rueppel, R.A. (1986a) Analysis and Design of Stream Ciphers, Berlin, Springer-Verlag.
Rueppel, R.A. (1986b) Correlation immunity and the summation generator, in H.C. Williams (ed.), Advances in Cryptology - Crypto’85, Lecture Notes in Computer Sci-ence 218, Springer, Berlin, pp.260–272.
Rueppel, R.A. (1991) Stream Ciphers, in Simmons, G.J. (ed.), in Contemporary Cryptology - The Science of Information Integrity, IEEE Press, pp.65–134.
Rueppel, R.A. and Staffelbach, O. (1987) Products of sequences with maximum linear complexity, IEEE Trans. Inform. Theory 33, 124–131.
Shannon, C.E. (1949) Communication theory of secrecy systems, Bell Syst. Tech. J. 28, 656–715.
Siegenthaler, T. (1984) Correlation-immunity of nonlinear combining functions for cryptographic applications, IEEE Trans. Inform. Theory 30, 776–780.
Siegenthaler, T. (1985a) Decrypting a class of stream ciphers using ciphertext onlyIEEE Trans. Comp. C-34, 81–85.
Siegenthaler, T. (1985b) Design of combiners to prevent divide and conquer attacks, in H.C. Williams (ed.), Advances in Cryptology - Crypto’85, Lecture Notes in Computer Science 218, Springer, Berlin, pp.273–279.
Siegenthaler, T. (1986) Cryptanalyst’s representation of nonlinearly filtered ML-sequences, in F. Pilcher (ed.), Advances in Cryptology - Eurocrypt ‘85, Lecture Notes in Computer Science 219, Springer, Berlin, pp.103–110.
Simmons, G.J. (1991) Contemporary Cryptology - The Science of Information Integrity, IEEE Press, New York.
Vernam, G.S. (1926) Cipher printing telegraph systems for secret wire and radio telegraphic communications, J. Amer. Inst. Elec. Eng. 45, 109–115.
Wolfmann, J. (1999) Bent fuctions and coding theory, this volume.
Xiao, G.Z. and Massey, J.L. (1988) A spectral characterization of correlation-immune functions, IEEE Trans. Inform. Theory 34, 569–571.
Zeng, K. and Huang, M. (1990) On the linear syndrome method in cryptanalysis, in S. Goldwasser (ed.), Advances in Cryptology, Proc. of Crypto ‘88, Lecture Notes in Computer Science 403, Springer, Berlin, pp.469–478.
Zeng, K., Yang, C.H. and Rao, T.R.N. (1991) An improved linear syndrome algorithm in cryptanalysis with applications, in A.J. Menezes and S.A. Vanstone (eds.), Advances in Cryptology, Proc. of Crypto ‘80, Lecture Notes in Computer Science 537, Springer, Berlin, pp.34–47.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Brincat, K., Piper, F.C., Wild, P.R. (1999). Stream Ciphers and Correlation. In: Pott, A., Kumar, P.V., Helleseth, T., Jungnickel, D. (eds) Difference Sets, Sequences and their Correlation Properties. NATO Science Series, vol 542. Springer, Dordrecht. https://doi.org/10.1007/978-94-011-4459-9_2
Download citation
DOI: https://doi.org/10.1007/978-94-011-4459-9_2
Publisher Name: Springer, Dordrecht
Print ISBN: 978-0-7923-5959-3
Online ISBN: 978-94-011-4459-9
eBook Packages: Springer Book Archive