On an improved summation generator with 2-bit memory
نویسندگان
چکیده
The summation generator is a real adder generator with a maximum period, near-maximum linear complexity and maximum order of correlation immunity. However it is neither secure against and nor immune to correlation attack between its output sequences and carry sequences in special cases. A modi"ed summation generator, secure against such an attack, has recently been proposed, but no proof is given about its period and linear complexity. In this paper, we propose a new modi"ed summation generator immune to correlation attack. Moreover, we conclude that its period is maximum and that its linear complexity is the same as that of the original summation generator. ( 2000 Elsevier Science B.V. All rights reserved.
منابع مشابه
Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory
Recently proposed algebraic attack has been shown to be very effective on several stream ciphers. In this paper, we have investigated the resistance of PingPong family of stream ciphers against algebraic attacks. This stream cipher was proposed in 2008 to enhance the security of the improved summation generator against the algebraic attack. In particular, we focus on the PingPong-128 stream cip...
متن کاملREGULAR PAPERS Algebraic Countermeasure to Enhance the Improved Summation Generator with 2-Bit Memory Md. Iftekhar Salam and Hoon-Jae Lee A Routing Protocol based on Temporal-awareness Ordered-MPR for Dynamic Wireless Multi-hop Mobile Networks
Recently proposed algebraic attack has been shown to be very effective on several stream ciphers. In this paper, we have investigated the resistance of PingPong family of stream ciphers against algebraic attacks. This stream cipher was proposed in 2008 to enhance the security of the improved summation generator. In particular, we focus on the PingPong-128 stream cipher’s resistance against alge...
متن کاملCorrelation Analysis of Summation Generator
J. Dj. Golić applied linear sequential circuit approximation (LSCA) method to analyze the summation generator with an arbitrary number of inputs. He conjectured that he could obtain all pairs of mutually correlated input and output linear functions with the maximum possible absolute value of the correlation coefficient by this method, but he did not give any proof. By using Walsh Transformation...
متن کاملFuzzy Logic-Based Security Evaluation of Stream Cipher
The main aim of this chapter is to provide a security evaluation method based on fuzzy logic “for a pseudo-random sequences used (mainly) in stream cipher systems. The designed Fuzzy rules consider two main parameters, which are the length of the maximum period of the key sequence obtained from Linear Feedback Shift Register (LFSR) and the entropy of the result in sequences obtained from differ...
متن کاملA Sub-threshold 9T SRAM Cell with High Write and Read ability with Bit Interleaving Capability
This paper proposes a new sub-threshold low power 9T static random-access memory (SRAM) cell compatible with bit interleaving structure in which the effective sizing adjustment of access transistors in write mode is provided by isolating writing and reading paths. In the proposed cell, we consider a weak inverter to make better write mode operation. Moreover applying boosted word line feature ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Signal Processing
دوره 80 شماره
صفحات -
تاریخ انتشار 2000