ON LINEAR COMPLEXITY OF GENERALIZED SHRINKING-MULTIPLEXING GENERATOR

Size: px
Start display at page:

Download "ON LINEAR COMPLEXITY OF GENERALIZED SHRINKING-MULTIPLEXING GENERATOR"

Transcription

1 Journal of Basic and Alied Research International 4(1): 8 17, 015 O LIEAR COMPLEXITY OF GEERALIZED SHRIKIG-MULTIPLEXIG GEERATOR ZHAETA. TASHEVA 1* 1 Faculty of Artillery, AAD and CIS, ational Military University V. Levski, Faculty of Technical Sciences, University of Shumen, Shumen, Bulgaria. AUTHOR S COTRIBUTIO This work was carried out by a single author. The author ZT designed the study, formulated and roved the theorem for linear comlexity of the GSMG outut sequence, erformed ractical data analysis and comarison with original Shrinking Generator. The author ZT managed the literature searches, wrote all versions of the manuscrit from the initial draft to the final one. Received: December 014; Acceted: January 015; Published: February 015 *Corresonding author: zh.tasheva@mail.bg; ABSTRACT The linear comlexity of the Generalized Shrinking-Multilexing Generator (GSMG), based on Linear Shift Feedback Registers (LFSRs), is investigated in this aer. The lower and uer bounds of linear comlexity of its outut binary Pseudo Random Sequences are established. It is roved that the linear comlexity increases exonentially with the length of the control -ary LFSR and the rime used. Some linear comlexity analysis is given. It is shown that the linear comlexity of the GSMG based on LFSRs is greater than the linear comlexity of the Shrinking Generator. Keywords: Stream Ciher, clock controlled generators, shrinking generator, LFSR, linear comlexity. 1. ITRODUCTIO In the era of mobile and wireless communication systems and Internet, security is commonly obtained by stream cihers. They are roven to rovide high seed encrytion, immunity from dictionary attacks, low error roagation and rotection against active wiretaing. Stream cihers encryt the message bit by bit (or character by character) using a keystream that is a time-varying function of the secret key. For synchronous stream cihers, the keystream is generated indeendently of the laintext and the cihertext using a keystream generator, commonly a Pseudo Random umber Generator (PRG) which roduces binary Pseudo Random Sequences (PRSs). On one hand, the PRGs high erformance velocity and cost-effective imlementation is based on their simle architecture which combines fast and chea elements like Linear Feedback Shift Registers (LFSRs) and Feedback with Carry Shift Registers (FCSRs) [1] with some nonlinear functions, like filter generators, combinatorial generators and clock controlled generators. On the other hand, the erformance quality of the clock controlled PRGs [], [3], [4], [5], [6] deends on their cryto resistance, which is connected with its ability to generate nonlinear PRS (PRS) with enormous eriod, uniform distribution and large linear comlexity. The irregular clocking of used LFSRs is a mechanism which roduces nonlinear keystream sequences with high linear comlexity. This contrivance allows avoiding most algebraic attacks by using LFSRs with small length, but these PRGs are more difficult to analyze and their seed is lower than the seed of regular clocked stream cihers. Some examles of such PRGs are Sto-and-Go Generator, Ste-Once- Twice Generator, Alternating Ste Generator, Shrinking Generator and Self-Shrinking Generator. The Sto-and-Go Generator [7] consists of two LFSRs. The outut of the first LFSR R 1 is the control

2 clock for the second LFSR R as R is clocked at time when R 1 oututs 1. The Sto-and-Go Generator is not suitable for crytograhy because of its oor statistical roerties. Ste-Once-Twice Generator [3] has the same building registers, but has an imrovement in the way register R is clocked that solves the statistical roblem. Better solution is offered by Alternating Ste Generator [8] which has higher seed than the Ste-Once-Twice Generator. It consists of three LFSRs, one of which determines which of the others to be clocked. The Shrinking Generator was roosed by Coersmith, Krawczyk and Mansour at Eurocryt'93 in [9]. It is a variation of the Ste-Once- Twice Generator and also consists of two LFSRs, a control register R 1 and a generator register R. The outut sequence of Shrinking Generator is constructed from two outut m-sequences according to the following selection rule: If the i-th bit of the control sequence is 1, then the i-th bit of the generator sequence becomes a art of the outut. If the i-th bit of the control sequence is 0, then the corresonding bit of the generator sequence is shrunken. Unlike of the Ste-Once-Twice Generator the Shrinking Generator can delete several successive bits which define its advantage that the shrunken ortions are less regular, and thereby the correlation attacks are harder. A disadvantage of the Shrinking Generator is that the seed of generation is variable, which requires the use of a buffer to revent side channel attacks. It is shown that Shrinking Generator has good algebraic and statistical roerties [9], [10]. Andreas Klein states that it is a remarkably simle ciher which has now been unbroken for more than 15 years [3]. Another simle ciher is the Self-Shrinking Generator roosed by W. Meier and O. Staffelbach at Eurocryt'94 [11]. It is a variant of Shrinking Generator and contains only a single LFSR. U to now it has surrisingly good resistance to all known crytograhic attacks. In 004 the Generalized Self- Shrinking Generator was roosed by Hu and Xiao [1]. It can be reresented as a generalization of the Self-Shrinking Generator as well as a secial case of the Shrinking Generator. Later in the same year were roosed two attacks that show that the Generalized Self-Shrinking Generator can t be more secure than the Self-Shrinking Generator [13]. Due to its good crytograhic roerties the Shrinking and Self-Shrinking Generators are still obect of research [14], [15], [16], [17], [18] and alication in modern security systems [19], [0], [1], []. In recent years the develoment of ellitic curve crytograhy determines the need of new units to erform arithmetic oerations over Galois Field GF(). Some FPGA hardware imlementations of an arithmetic unit that comutes basic oerations such as addition, subtraction, multilication and multilicative inverse modulo rime have been roosed [3], [4], [5]. The FPGA arithmetic units over GF() can be used for easy imlementation of the LFSRs that roduce -ary m-sequences. Due to this reasons we have recently roosed some clock controlled generators which use a -ary PRS instead of binary PRS [6], [7], [8]. The aim of this aer is to investigate the linear comlexity of a Generalized Shrinking-Multilexing Generator (GSMG) based on LFSRs. The aer is organized as follows. First, the GSMG architecture based on LFSRs is described. Second, the linear comlexity of the GSMG based on LFSRs is established. After that some linear comlexity analysis and a comarison with the Shrinking Generator are given. Finally, the advantages and ossible alication areas of the GSMG based on LFSRs are discussed.. GSMG Architecture Based on LFSRs In this section the GSMG architecture based on LFSRs is recalled and the simlest ossible examle of Galois reresentation of GSMG architecture is discussed..1 The Basics of GSMG Architecture Based on LFSRs The roosed general architecture of the GSMG [6] can be realized by means of linear or nonlinear seudo random sequences. There are eight ossible variants of the GSMG architecture deending on the linear constructive elements, which most often are fast and chea LFSRs and FCSRs. Most of these GSMG architectures are statistically analyzed by the authors of [7], [8], [9] but strong mathematical analyses have not been made yet. Here the linear comlexity of the fifth architecture [30] is analyzed. The GSMG architecture based on LFSRs (Fig. 1) uses as building modules 1 in number LFSRs and one -ary LFSR (briefly LFSR). Definition 1: A GSMG based on LFSRs comrises a LFSR R of length L and 1 in number slaved LFSRs each of length L 1, L,, L 1. The LFSR R roduces one -ary number at a time. The clock controls the movement of the data in all used LFSRs. The algorithm of GSMG based on LFSRs consists of the following stes: 9

3 1. The control LFSR and all slaved LFSRs are clocked.. If the -ary outut of the control LFSR R at a moment i is non-zero (b i =, 0), the binary outut of the slaved LFSRs R forms one art of the outut binary PRS S. 3. Otherwise, if the outut of the control LFSR R is equal to 0 (b i = 0), the oututs of all slaved LFSRs R 1, R,, R 1 are discarded. Therefore, the roduced binary PRS is a shrunken version of the slaved binary PRSs, generated by the LFSRs R 1 R -1, when the outut of the control -ary PRS (briefly PRS) B is zero, and a mixed version of the slaved PRSs, when the outut is nonzero. Due to this reason, the outut binary sequence S is nonlinear and unredictable with more comlexity than the sequences, roduced by the slaved LFSRs. The nonlinearity in the GSMG architecture based on LFSRs is a result of the fact that the linear algebraic structure of the slaved LFSR sequences is destroyed by means of the shrinking and multilexing.. Examle of GSMG Architecture Based on LFSRs The simlest ossible examle of GSMG architecture based on LFSRs is resented below. It uses the smallest non binary rime = 3, and consists of two LFSRs of length L 1 = 3 and L =, and a control 3-ary LFSR with length L =. Examle 1: The GSMG architecture consists of a control 3-ary LFSR with feedback rimitive olynomial q(x) = x + x 1 which roduces 3-ary PRS B with eriod T = 8 and two slaved LFSRs which generate binary sequences A 1 and A with lengths T 1 = 7 and T = 3 resectively. The feedback rimitive olynomials of LFSRs R 1 and R are q 1 (x) = x 3 + x + 1 and q (x) = x + x + 1. The GSMG architecture from Examle 1 is given in Fig.. Each element of the Galois reresentation of LFSRs R 1 and R can hold a bit in a time. The elements r 0 and r 1 of the Galois reresentation of a 3- ary LFSR R can remember one 3-ary number, i.e. digits 0, 1 and. The elements in registers R 1 and R realize the simle XOR oeration, but the element in register R erforms oeration add mod 3. The seed of the GSMG is determined by the initial states of the registers R 1, R and R. Register R 1 with initial state [ r 1, r11, r01] [0,1,1 ] generates binary PRS A 1 = [ ] with eriod T 1 = 7. Register R with initial state [ r 1, r0] [1,1 ] generates binary PRS A = [101] with eriod T = 3. Ternary LFSR R with initial state [ r 1, r0 ] [0, ] generates 3-ary PRS B = [10110] with eriod T = 8. As one can see in a eriod of 3-ary PRS B each nonzero 3-ary number 1 or occurs 3 times, and zero number occurs times, which corresonds to the balance roerty definition for this current PRS [31]. The selection rule of the GSMG outut sequence S is shown in Table 1. When the outut number b i of the control sequence B is b i = 1, the corresonding bit from slave sequence A 1 forms the outut bit s i = a i 1. When the outut number b i of the control sequence B is b i =, the corresonding bit from slave sequence A forms the outut bit s i = a i. These bits are underlined in Table 1. If number b i of the control sequence B is b i = 0, then there is a ga in the GSMG outut sequence S. Every odd eriod of the PRSs is given in bold. As one can see from Table 1, the outut GSMG sequence S is nonlinear due to the used shrinking and multilexing method and its eriod T S is much more than the eriod of each used PRS. The GSMG outut sequence S is binary with eriod T S = 16 = = T 1. T. T 0, where T 0 = 6 is the number of the -ary integers different from 0 in one eriod of the control 3-ary PRS. 3. THE LIEAR COMPLEXITY OF THE SEQUECES GEERATED BY GSMG BASED O LFSRS In this section the lower and uer bounds of linear comlexity of the sequences generated by GSMG based on LFSRs are mathematically roven. Thereafter the ractical results of real linear comlexity of GSMG sequences tested by the Berlekam-Massey algorithm are calculated. Finally a comarison between linear comlexity of GSMG architecture based on LFSRs and Shrinking Generator is made. The imortance of the exonentially large PRS linear comlexity comes from the strong necessity of avoiding some oular attacks on PRSs or stream chiers. There is no need to know the way a PRS is generated in order to break it through its linear comlexity. In fact, any PRS with linear comlexity can be easily reconstructed if bits are known by the Berlekam-Massey algorithm [3], [33], which in time O( ) finds the shortest LFSR generating this PRS. 10

4 Selection Rule a i 1 LFSR R 1 LFSR R a i b i = 1 b i = Outut binary PRS S Clock LFSR R -1 a i -1 b i = 1 If b i = 0 Discards all a i LFSR R b i Fig. 1. Generalized shrinking multilexing generator based on LFSRs Selection Rule R 1 r 1 r 11 r 01 A 1 b i = 1 S R r 1 r 0 A b i = Clock R + mod 3 B b i = 0 r 1 r 0 Fig.. The GSMG architecture from examle 1 Table 1. The selection rule for outut sequence S of the GSMG from Examle 1 3PRS B PRS 1 A PRS A PRS S PRS B PRS 1 A PRS A PRS S PRS B PRS 1 A PRS A PRS S

5 Here, it should be mentioned that the high linear comlexity is only necessary but not sufficient condition PRG to have good crytograhic roerties. There are many other conditions like large eriod; uniform distribution of d-tules for a large range of d; good, usually lattice-liked, structure in high dimensions; good statistical roerties; resistance to known attacks and so on. 3.1 Theoretical Analysis of Linear Comlexity The linear comlexity, S, of the infinite sequence S = s 0, s 1, s,, where each s i lies in the field F, is the smallest nonnegative integer L for which there exist coefficients c 1, c,, c L in F such that (1) Seaking as engineers, it can be said that the S is the length L of the shortest LFSR that can generate S when the first L digits of S are initially loaded in this LFSR. In the following aragrah Theorem 1 that determines the eriod Т s of the sequence S is used to establish the uer and lower bound of the linear comlexity of sequence S generated by the GSMG based on LFSRs. Refer to [30] to see the roof of Theorem 1. Theorem 1: If the sequences A, = 1,, 1, generated by the slaved LFSRs R, and the sequence B, generated by the control LFSR R, have maximal length (i.e. all slaved LFSRs and LFSR have rimitive connection olynomials) and all eriods Т of the slaved LFSRs are co-rime with the eriod T of the control LFSR, i.e. the greatest common divisor (Т, Т) = 1 for = 1,,, 1, then the outut shrinking and multilexing sequence S, generated by the GSMG based on LFSRs, has maximal eriod T S defined by the equation: 1 1 L TS ( 0). T ( 0). where ( 0) () is the number of all nonzero elements in a eriod of the control PRS sequence and L, = 1,,, 1 are the lengths of the slaved LFSR R. The number ( 0) 1, of the nonzero elements in a eriod of the control PRS sequence can be calculated using the balance roerty of non-binary PRSs [31]. Balance roerty: In every eriod of non-binary PRSs, each nonzero element in F q occurs q L 1 times and the zero element in F q occurs q L 1 1 times. The nonzero elements in a eriod of the control PRS are 1 in number in Galois Field GF() and each of them occurs L 1 times, consequently ( 0) ( 1) (3) The linear comlexity s of the sequence S generated by the GSMG based LFSRs satisfies the following Theorem. Theorem : If the sequences A, = 1,, 1, generated by the slaved LFSR R, and the sequence B, generated by the control LFSR R, have maximal lengths (i.e. all slaved LFSRs and LFSR have rimitive connection olynomials) and all eriods Т i of the slaved LFSRs are co-rime with the eriod T of the control LFSR, i.e. the greatest common divisor (Т, Т) = 1 for = 1,,, 1, then the outut shrinking and multilexing sequence S, generated by the GSMG based on LFSRs, has a linear comlexity s satisfied the inequality: 1 1 ( 1). (4) L S ( 1) L i Let a (i) be the i-th element of the sequence A, = 1,, 1, generated by the slaved LFSR R, b(i) denotes the i-th element of the sequence B, generated by the control LFSR R, and s(i) be the i-th element of the sequence S, generated by the GSMG based on LFSRs. The next roosition, which follow from the definition of the GSMG based on LFSRs, is used in the roof of Theorem. Proosition 1: The integers connected by equation and T are s( i n. ( 0) ) a ( ki nt), for n 0,1, (5) Proof: To determine an uer bound on the linear comlexity s of the sequence S, it is sufficed to find a olynomial P(.), for which P(s) = 0, i.e. the coefficients of P(.) reresents a linear deendency satisfied by the elements of a sequence S. Let s ( 0) be the sequence s( n( 0) ), n 0, 1,, i.e. the sequence S is decimated by ( 0). Proosition 1 states that this decimation results in transformation of every slaved sequence of the form a ( i nt), 1,,, 1. Since (Т, Т) = 1, = 1,,, 1, the above sequences. ( 0) 1

6 a ( i nt), 1,,, 1 have maximal length and have the same linear comlexity as the original sequences a ( i), 1,,, 1. Therefore, the olynomials Q (.) of degree L i exist for which Q (a ) = 0. But then the decimated sequence satisfies olynomials Q (.), i.e. Q Hence, a olynomial of degree ) ( s ( 0 ) 0, 1,,, 1 ( 0) P( s) Q ( s ). (6) (7) 1 ( 0) L i, such that P(s) = 0, is found. i 1 Consequently, the linear comlexity s of the sequence S generated by the GSMG based on LFSRs is at most (8) To determine a lower bound on the linear comlexity s of the sequence S, it is necessary to find the minimal olynomial m(s) for which m(s) = 0. Since the sequence S satisfied the equation (6), then the olynomial m(s) divides each olynomial ( 0) Q ( s ), 1,,, 1. After utting the equation (3) in (6), the following equations are obtained ( 0) ( 1) Q ( s ) Q ( s ). (9) ( 1) ( Q ( s)), 1,,, S ( 0) L ( 1) L. Therefore, the minimal olynomial m(s) must be in r the form ( Q ( s)) for r ( 1). The is a rime number and hence, 1 is even. s ( 0) The following assumtions is made ( 1) r. (10) Then the minimal olynomial m(s) divides each ( 1) olynomial ( Q ( s)), 1,,, 1. Since Q (s), 1,,, 1 are irreducible olynomials of degree L, they divide the olynomials 1 x T resectively. Consequently, olynomial m(s) divides ( 1) T (1 x ) ( 1) T. 1 x. (11) But then the eriod of the sequence S, generated by the GSMG based on LFSRs, is at most 1 ( 1) L TS. ( This contradicts to the Theorem 1, because 1). (1) ( 1) ( 0). (13) Therefore, the assumtion isn t true and ( 1) r, i.e. the lower bound on the linear comlexity s of the sequence S is 1 ( 1) S L. (14) This conclusion ends the roof of the Theorem. 3. Practical Analysis of Linear Comlexity The GSMG architecture based on LFSRs is modeled in Visual C# environment. The linear comlexity of the generated sequences by the LFSR based GSMG are ractically analyzed by means of the Berlekam- Massey algorithm. The theoretical lower and uer bounds of the linear comlexity S, given by the Theorem, and real S found by the Berlekam- Massey algorithm are given in Table. The eriod of the outut shrinking and multilexing sequence S also is shown in the Table. 13

7 Table. Linear Comlexity of the PRSs, generated by GSMG based on LFSRs, with = 3 Used PRSs Primitive Polynomials Length Period T S Linear Comlexity of the PRSs, generated by the LFSR based GSMG Lower Bound Uer Bound Real 1 PRS A x + x 3 L 1 = = = = PRS A 1 + x + x 4 L = 3 3PRS B 1 + x + x 3 L = PRS A x + x L 1 = / 3 = = 7 7. = PRS A 1 + x + x 4 L = 4 3PRS B 1 + x + x 3 L = 3 3 PRS A x + x 3 L 1 = = = = PRS A 1 + x + x L = 3PRS B 1 + x + x 3 L = 3 4 PRS A x + x 3 L 1 = = = = 7 4 PRS A 1 + x + x 4 L = 4 3PRS B + x + x L = 5 PRS A x + x L 1 = / 3 = = 4 4. = PRS A 1 + x + x 4 L = 4 3PRS B + x + x L = 6 PRS A x + x 3 L 1 = = = = PRS A 1 + x + x L = 3PRS B + x + x L = 7 PRS A x + x 3 L 1 = = = = PRS A 1 + x + x L = 3PRS B + x + x 4 L = 4 8 PRS A x + x 3 L 1 = = = = PRS A 1 + x + x 5 L = 5 3PRS B + x + x L = 9 PRS A x + x L 1 = = = = 60 4 PRS A 1 + x + x 5 L = 5 3PRS B + x + x L = The ractical analysis of the linear comlexity and eriod of the sequences S, generated by the GSMG based on LFSRs, confirm that the real eriod and the linear comlexity of tested sequence fall into the bounds roven by Theorem 1 and Theorem, i.e. the exonential eriod and exonential bounds of the linear comlexity. 3.3 Comarison with Shrinking Generator Here, the linear comlexity of the sequences generated by the GSMG based on LFSRs is comared to the linear comlexity of the original Shrinking Generator. First, when =, Theorem states: Corollary 1: If the sequences A 1, generated by the slaved LFSR R 1, and the sequence B, generated by the control LFSR R, have maximal lengths (i.e. LFSR R 1 and LFSR R have rimitive connection olynomials) and eriod Т 1 of the slaved LFSR R 1 are co-rime with the eriod T of the control LFSR, i.e. the greatest common divisor (Т 1, Т) = 1, then the outut shrinking and multilexing sequence S, generated by the GSMG based on LFSRs, has a linear comlexity s satisfied the inequality: L1 S. L1. (15) These are the minimum bound L 1. L and maximum bound L 1. L 1 of the linear comlexity of the Shrinking Generator, given by Theorem in [9]. Here L is the length of the control LFSR and L 1 is the length of the generator register. By comaring the bounds of the linear comlexity of the two generators can be concluded that the linear comlexity of the sequences generated by the GSMG based on LFSRs is more than the one of the Shrinking Generator. This is because it increases exonentially with the length L of the control register and with base of the ower which is the value of the used rime. For examle, if the length of a 3-ary control register L is equal to that of the control LFSR in Shrinking Generator (L = L ), the bounds of the GSMG linear comlexity will be 14

8 3 L. L1 S.3 L. L1. (16) For the simlest ossible Examle 1 given in section., L =, L 1 = 3 and L = L =, the bounds for GSMG and Shrinking Generator are resectively 18 S GSMG 36 and 3 S SG 6. As one can see the lower and uer bounds of GSMG linear comlexity are 6 times higher than those of the Shrinking Generator. This, on the other hand, increases the comlexity of hardware or software imlementation of the GSMG based on LFSRs. In Examle 1, the hardware imlementation was increased by ternary control register. 4. COCLUSIO AD FUTURE WORK In this aer the linear comlexity of the Generalized Shrinking-Multilexing Generator based on LFSRs is investigated mainly through algebraic techniques. It is roved that the lower and uer bounds of the linear comlexity S of GSMG outut sequence S are exonential in length of control -ary LFSR and used rime. Previously in [30] has been roven that the bounds of the GSMG eriod are exonential of both the length of control -ary LFSR and the lengths of the used 1 in number slaved LFSRs. Also have been shown that the GSMG outut sequence S have good statistical roerties. The GSMG based on LFSRs similarly to the Shrinking generator can delete several successive bits in the outut sequence which defines its advantage in its less regular shrunken ortions, and thereby its correlation attacks are harder. Furthermore, besides that the GSMG outut sequence is shrunken, it is a multilexed version of slaved LFSRs sequences and both define unredictable nonlinearity of the outut sequence. A disadvantage of the GSMG is that the seed of generation is variable, which requires the use of a buffer to revent side channel attacks. As indicated above, the comlexity of hardware and software imlementation increases with the chosen rime, but the roosed architecture allows arallel imlementation of used registers as in a hardware FPGA imlementation, as in a software imlementation in a various rocessor cores. Thus, the roosed GSMG architecture based on LFSRs allows roducing binary seudo random sequences with good roerties like unredictable nonlinearity, enormous eriod, large linear comlexity, and good statistical roerties. This shows that the main goals of the seudo random number generators are achieved by GSMG architecture based on LFSRs. Consequently, it satisfies the minimal conditions for the construction of stream cihers in the high-seed communication alications. evertheless, there are some theoretical and ractical issues that need to be addressed. From a theoretical oint of view, imroved crytanalysis of the GSMG architecture based on LFSRs keystream sequences is necessary to be done. On the ractical side, the real hardware arallel FPGA imlementation must be designed. Aroriate choice for software imlementation are GSMG architectures with = 3 and = 5, which can be easily arallelized with dual and quad core rocessors resectively. ACKOWLEDGEMETS I wish to exress my acknowledgments to the anonymous referees whose remarks heled me make this aer as best as ossible. DECLARATIO Some art of this manuscrit was reviously resented and ublished in the following conference. Conference name: International conference on Comuter systems and technologies ComSysTech 07. Dates: June 14-15, 007. Location: Rousse, Bulgaria. Web Link of the roceeding: The eriod of the LFSR based generalized shrinking-multilexing generator, htt://dl.acm.org/citation.cfm?id= COMPETIG ITERESTS Authors have declared that no cometing interests exist. REFERECES 1. Goresky M., A. Klaer, Fibonacci and Galois Reresentations of Feedback-With-Carry Shift Registers, IEEE Trans. on Inform. Theory, vol. 48, , ovember 00.. Kanso, A. Clock-controlled generators. University of London, Klein, A. Stream cihers. London: Sringer, Menezes A., P. Oorschot, S. Vanstone, Handbook of Alied Crytograhy, CRC Press,. 780, 1997, 15

9 5. Rueel R., Analysis and Design of Stream Cihers, Sringer Verlag,. Y., Schneier B., Alied Crytograhy, John Wiley & Sons, ew York, Beth, T., and F. Pier. The Sto-and-Go Generator. In EUROCRYPT, vol. 84, Günther, Christoh G. "Alternating ste generators controlled by de Bruin sequences." In Advances in Crytology EUROCRYPT 87, Sringer Berlin Heidelberg, Coersmith D., H. Krawczayk, Y. Mansour, The Shrinking Generator, Cryto 93, htt:// 84_009/ShrinkingGenerator.df 10. Sharlinski, I. On some roerties of the shrinking generators. In Designs, Codes and Crytograhy, vol. 3 Issue, 001, Meier, W., and O. Staffelbach. The selfshrinking generator. In Communications and Crytograhy, Sringer US, Hu, Y., and G. Xiao. Generalized selfshrinking generator. Information Theory, IEEE Transactions on 50, o. 4, 004, Zhang, B., H. Wu, D. Feng, and F. Bao. Security analysis of the generalized selfshrinking generator. In Information and Communications Security, Sringer Berlin Heidelberg, Arshad, Ghoosia, Aihab Khan, Malik Sikandar Hayat Khiyal, and Mina Masood. "Analysis and Design of Alternating Ste Shrinking Generator (ASSG) for Imroved Security." International Journal of Comuter Theory and Engineering 3, no. 4, Fúster-Sabater, A. "Generation of Crytograhic Sequences by means of Difference Equations." Al. Math 8, no., 014, Fúster-Sabater, A. Characterization of the Least Periods of the Generalized Self- Shrinking Sequences. arxiv rerint arxiv: , Huiuan, W., W. Qiaoyan, and J. Zhang. The Proerties of the FCSR-Based Self-Shrinking Sequence. IEICE TRASACTIOS on Fundamentals of Electronics, Communications and Comuter Sciences 96, o., 013, Salam, M., and H. Lee. Algebraic Analysis of Shrinking Generator. Int. Journal of Math. Analysis, Vol. 6, no. 50, 01, Kanso, A. "Self-shrinking chaotic stream cihers." Communications in nonlinear science and numerical simulation 16, no., 011, Kanso, A. Modified self-shrinking generator. Comuters & Electrical Engineering 36, o. 5, 010, Sundaresan, S., R. Doss, S. Piramuthu, and W. Zhou. "A Robust Grouing Proof Protocol for RFID EPC C1G Tags." Information Forensics and Security, IEEE Transactions on. Vol. 9, Issue 6, 014, Sundaresan, S., R. Doss, S. Piramuthu, and W. Zhou. "Secure Tag Search in RFID Systems Using Mobile Readers." Deendable and Secure Comuting, IEEE Transactions on. 014: Bertoni, G., J. Guaardo, S. Kumar, G. Orlando, C. Paar, and T. Wollinger. Efficient GF( m ) arithmetic architectures for crytograhic alications. In Toics in Crytology CT-RSA 003, Sringer Berlin Heidelberg, Daly, A., W. Marnane, T. Kerins, and E. Poovici. An FPGA imlementation of a GF() ALU for encrytion rocessors. Microrocessors and Microsystems 8, o , Hlaváč, J., and R. Lórencz. Arithmetic unit for comutations in GF() with the left-shifting multilicative inverse algorithm. In Architecture of Comuting Systems ARCS 013, Sringer Berlin Heidelberg, Tashev T., B. Bedzhev, Zh. Tasheva, The Generalized Shrinking-Multilexing Generator, In Proceedings of the 007 international conference on Comuter systems and technologies,. 48. ACM, Tasheva A. T., Zh.. Tasheva, A. P. Milev (011). Generalization of the Self-Shrinking Generator in the Galois Field GF( n ). Advances in Artificial Intelligence, vol. 011, Article ID , 10 ages, 011. doi: /011/ Tasheva Zh., B. Bedzhev, V. Mutkov, A Shrinking Data Encrytion Algorithm with - adic Feedback with Carry Shift Register. Conference Proc. of XII Int. Sym. on Theoretical Electrical Engineering, ISTET 03, July 6-9, 003, Warsaw, Poland, Volume II, , Tasheva Zh., B. Bedzhev, B. Stoyanov, adic Summation-Shrinking Generator. Basic roerties and emirical evidences. Crytology eprint Archive, Co-Editors: Mihir Bellare, UCSD Christian Cachin, IBM Zurich, 16

10 Acceted and osted with umber 005/068, htt://erint.iacr.org/005/068.df. 30. Tashev T., The eriod of the LFSR based generalized shrinking-multilexing generator. In Proceedings of the 007 international conference on Comuter systems and technologies,. 55. ACM, Gong G., Sequence Analysis. University of Waterloo, 1999, s. 137, htt://callioe.uwaterloo.ca/~ggong. 3. Atti. B., G. M. Diaz Toca, H. Lombardi, The Berlekam-Massey Algorithm revisited. Alicable Algebra in Engineering, Communication and Comuting, Vol. 17, umber 1, 006, Sringer Berlin, Heidelberg, htt:// /. 33. Greenberg S.,. Feldblum, G. Melamed, Imlementation of the Berlekam-Massey algorithm using a DSP. Proceedings of the th IEEE International Conference Electronics, Circuits and Systems, ICECS 004, ISB: , , 004. Coyright International Knowledge Press. All rights reserved. 17

Elliptic Curves and Cryptography

Elliptic Curves and Cryptography Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a

More information

Outline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding

Outline. EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Simple Error Detection Coding Outline EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Error detection using arity Hamming code for error detection/correction Linear Feedback Shift

More information

Galois Fields, Linear Feedback Shift Registers and their Applications

Galois Fields, Linear Feedback Shift Registers and their Applications Galois Fields, Linear Feedback Shift Registers and their Alications With 85 illustrations as well as numerous tables, diagrams and examles by Ulrich Jetzek ISBN (Book): 978-3-446-45140-7 ISBN (E-Book):

More information

1. Introduction. 2. Background of elliptic curve group. Identity-based Digital Signature Scheme Without Bilinear Pairings

1. Introduction. 2. Background of elliptic curve group. Identity-based Digital Signature Scheme Without Bilinear Pairings Identity-based Digital Signature Scheme Without Bilinear Pairings He Debiao, Chen Jianhua, Hu Jin School of Mathematics Statistics, Wuhan niversity, Wuhan, Hubei, China, 43007 Abstract: Many identity-based

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS #A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt

More information

AN IMPROVED BABY-STEP-GIANT-STEP METHOD FOR CERTAIN ELLIPTIC CURVES. 1. Introduction

AN IMPROVED BABY-STEP-GIANT-STEP METHOD FOR CERTAIN ELLIPTIC CURVES. 1. Introduction J. Al. Math. & Comuting Vol. 20(2006), No. 1-2,. 485-489 AN IMPROVED BABY-STEP-GIANT-STEP METHOD FOR CERTAIN ELLIPTIC CURVES BYEONG-KWEON OH, KIL-CHAN HA AND JANGHEON OH Abstract. In this aer, we slightly

More information

Efficient Hardware Architecture of SEED S-box for Smart Cards

Efficient Hardware Architecture of SEED S-box for Smart Cards JOURNL OF SEMICONDUCTOR TECHNOLOY ND SCIENCE VOL.4 NO.4 DECEMBER 4 37 Efficient Hardware rchitecture of SEED S-bo for Smart Cards Joon-Ho Hwang bstract This aer resents an efficient architecture that otimizes

More information

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018 Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3

More information

Randomness Extraction in finite fields F p

Randomness Extraction in finite fields F p Randomness Extraction in finite fields F n Abdoul Aziz Ciss École doctorale de Mathématiques et d Informatique, Université Cheikh Anta Dio de Dakar, Sénégal BP: 5005, Dakar Fann abdoul.ciss@ucad.edu.sn,

More information

Lattice Attacks on the DGHV Homomorphic Encryption Scheme

Lattice Attacks on the DGHV Homomorphic Encryption Scheme Lattice Attacks on the DGHV Homomorhic Encrytion Scheme Abderrahmane Nitaj 1 and Tajjeeddine Rachidi 2 1 Laboratoire de Mathématiques Nicolas Oresme Université de Caen Basse Normandie, France abderrahmanenitaj@unicaenfr

More information

A Public-Key Cryptosystem Based on Lucas Sequences

A Public-Key Cryptosystem Based on Lucas Sequences Palestine Journal of Mathematics Vol. 1(2) (2012), 148 152 Palestine Polytechnic University-PPU 2012 A Public-Key Crytosystem Based on Lucas Sequences Lhoussain El Fadil Communicated by Ayman Badawi MSC2010

More information

Bayesian System for Differential Cryptanalysis of DES

Bayesian System for Differential Cryptanalysis of DES Available online at www.sciencedirect.com ScienceDirect IERI Procedia 7 (014 ) 15 0 013 International Conference on Alied Comuting, Comuter Science, and Comuter Engineering Bayesian System for Differential

More information

Round-off Errors and Computer Arithmetic - (1.2)

Round-off Errors and Computer Arithmetic - (1.2) Round-off Errors and Comuter Arithmetic - (.). Round-off Errors: Round-off errors is roduced when a calculator or comuter is used to erform real number calculations. That is because the arithmetic erformed

More information

Cryptography. Lecture 8. Arpita Patra

Cryptography. Lecture 8. Arpita Patra Crytograhy Lecture 8 Arita Patra Quick Recall and Today s Roadma >> Hash Functions- stands in between ublic and rivate key world >> Key Agreement >> Assumtions in Finite Cyclic grous - DL, CDH, DDH Grous

More information

An Overview of Witt Vectors

An Overview of Witt Vectors An Overview of Witt Vectors Daniel Finkel December 7, 2007 Abstract This aer offers a brief overview of the basics of Witt vectors. As an alication, we summarize work of Bartolo and Falcone to rove that

More information

Enumeration of Balanced Symmetric Functions over GF (p)

Enumeration of Balanced Symmetric Functions over GF (p) Enumeration of Balanced Symmetric Functions over GF () Shaojing Fu 1, Chao Li 1 and Longjiang Qu 1 Ping Li 1 Deartment of Mathematics and System Science, Science College of ational University of Defence

More information

A Modified Menezes-Vanstone Elliptic Curve Multi-Keys Cryptosystem

A Modified Menezes-Vanstone Elliptic Curve Multi-Keys Cryptosystem A Modified Menezes-Vanstone Ellitic Curve Multi-Keys Crytosystem By K.H. Rahouma Electrical Technology Deartment Technical College in Riyadh Riyadh, Kingdom of Saudi Arabia E-mail: kamel_rahouma@yahoo.com

More information

Modified Alternating Step Generators

Modified Alternating Step Generators Modified Alternating Step Generators Robert Wicik, Tomasz Rachwalik Military Communication Institute Warszawska 22A, 05-130 Zegrze, Poland {r.wicik, t.rachwalik}@wil.waw.pl Abstract. Irregular clocking

More information

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields Malaysian Journal of Mathematical Sciences 10(S February: 15-35 (016 Secial Issue: The 3 rd International Conference on Mathematical Alications in Engineering 014 (ICMAE 14 MALAYSIAN JOURNAL OF MATHEMATICAL

More information

#A8 INTEGERS 12 (2012) PARTITION OF AN INTEGER INTO DISTINCT BOUNDED PARTS, IDENTITIES AND BOUNDS

#A8 INTEGERS 12 (2012) PARTITION OF AN INTEGER INTO DISTINCT BOUNDED PARTS, IDENTITIES AND BOUNDS #A8 INTEGERS 1 (01) PARTITION OF AN INTEGER INTO DISTINCT BOUNDED PARTS, IDENTITIES AND BOUNDS Mohammadreza Bidar 1 Deartment of Mathematics, Sharif University of Technology, Tehran, Iran mrebidar@gmailcom

More information

Sets of Real Numbers

Sets of Real Numbers Chater 4 Sets of Real Numbers 4. The Integers Z and their Proerties In our revious discussions about sets and functions the set of integers Z served as a key examle. Its ubiquitousness comes from the fact

More information

Cryptography Assignment 3

Cryptography Assignment 3 Crytograhy Assignment Michael Orlov orlovm@cs.bgu.ac.il) Yanik Gleyzer yanik@cs.bgu.ac.il) Aril 9, 00 Abstract Solution for Assignment. The terms in this assignment are used as defined in [1]. In some

More information

On Erdős and Sárközy s sequences with Property P

On Erdős and Sárközy s sequences with Property P Monatsh Math 017 18:565 575 DOI 10.1007/s00605-016-0995-9 On Erdős and Sárközy s sequences with Proerty P Christian Elsholtz 1 Stefan Planitzer 1 Received: 7 November 015 / Acceted: 7 October 016 / Published

More information

Solving Cyclotomic Polynomials by Radical Expressions Andreas Weber and Michael Keckeisen

Solving Cyclotomic Polynomials by Radical Expressions Andreas Weber and Michael Keckeisen Solving Cyclotomic Polynomials by Radical Exressions Andreas Weber and Michael Keckeisen Abstract: We describe a Male ackage that allows the solution of cyclotomic olynomials by radical exressions. We

More information

Advanced Cryptography Midterm Exam

Advanced Cryptography Midterm Exam Advanced Crytograhy Midterm Exam Solution Serge Vaudenay 17.4.2012 duration: 3h00 any document is allowed a ocket calculator is allowed communication devices are not allowed the exam invigilators will

More information

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS #A47 INTEGERS 15 (015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS Mihai Ciu Simion Stoilow Institute of Mathematics of the Romanian Academy, Research Unit No. 5,

More information

Mobius Functions, Legendre Symbols, and Discriminants

Mobius Functions, Legendre Symbols, and Discriminants Mobius Functions, Legendre Symbols, and Discriminants 1 Introduction Zev Chonoles, Erick Knight, Tim Kunisky Over the integers, there are two key number-theoretic functions that take on values of 1, 1,

More information

MAS 4203 Number Theory. M. Yotov

MAS 4203 Number Theory. M. Yotov MAS 4203 Number Theory M. Yotov June 15, 2017 These Notes were comiled by the author with the intent to be used by his students as a main text for the course MAS 4203 Number Theory taught at the Deartment

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

Tanja Lange Technische Universiteit Eindhoven

Tanja Lange Technische Universiteit Eindhoven Crytanalysis Course Part I Tanja Lange Technische Universiteit Eindhoven 28 Nov 2016 with some slides by Daniel J. Bernstein Main goal of this course: We are the attackers. We want to break ECC and RSA.

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

HENSEL S LEMMA KEITH CONRAD

HENSEL S LEMMA KEITH CONRAD HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar

More information

p-adic Measures and Bernoulli Numbers

p-adic Measures and Bernoulli Numbers -Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Bent Functions of maximal degree

Bent Functions of maximal degree IEEE TRANSACTIONS ON INFORMATION THEORY 1 Bent Functions of maximal degree Ayça Çeşmelioğlu and Wilfried Meidl Abstract In this article a technique for constructing -ary bent functions from lateaued functions

More information

Distinguishing Stream Ciphers with Convolutional Filters

Distinguishing Stream Ciphers with Convolutional Filters Distinguishing Stream Ciphers with Convolutional Filters Joan Daemen and Gilles Van Assche STMicroelectronics Smart Cards ICs Division Excelsiorlaan 44 46, 930 Zaventem, Belgium February 5, 2005 Abstract

More information

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM

ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM ANALYTIC NUMBER THEORY AND DIRICHLET S THEOREM JOHN BINDER Abstract. In this aer, we rove Dirichlet s theorem that, given any air h, k with h, k) =, there are infinitely many rime numbers congruent to

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

A New and Optimal Chosen-message Attack on RSA-type Cryptosystems

A New and Optimal Chosen-message Attack on RSA-type Cryptosystems Published in Y. Han, T. Okamoto, and S. Qing, eds, Information and Communications Security (ICICS 97), vol. 1334 of Lecture Notes in Comer Science,. 30-313, Sringer-Verlag, 1997. A New and Otimal Chosen-message

More information

Math 4400/6400 Homework #8 solutions. 1. Let P be an odd integer (not necessarily prime). Show that modulo 2,

Math 4400/6400 Homework #8 solutions. 1. Let P be an odd integer (not necessarily prime). Show that modulo 2, MATH 4400 roblems. Math 4400/6400 Homework # solutions 1. Let P be an odd integer not necessarily rime. Show that modulo, { P 1 0 if P 1, 7 mod, 1 if P 3, mod. Proof. Suose that P 1 mod. Then we can write

More information

On the normality of p-ary bent functions

On the normality of p-ary bent functions Noname manuscrit No. (will be inserted by the editor) On the normality of -ary bent functions Ayça Çeşmelioğlu Wilfried Meidl Alexander Pott Received: date / Acceted: date Abstract In this work, the normality

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun

More information

On the Unpredictability of Bits of the Elliptic Curve Diffie Hellman Scheme

On the Unpredictability of Bits of the Elliptic Curve Diffie Hellman Scheme On the Unredictability of Bits of the Ellitic Curve Diffie Hellman Scheme Dan Boneh 1 and Igor E. Sharlinski 2 1 Deartment of Comuter Science, Stanford University, CA, USA dabo@cs.stanford.edu 2 Deartment

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

The inverse Goldbach problem

The inverse Goldbach problem 1 The inverse Goldbach roblem by Christian Elsholtz Submission Setember 7, 2000 (this version includes galley corrections). Aeared in Mathematika 2001. Abstract We imrove the uer and lower bounds of the

More information

Self-shrinking Bit Generation Algorithm Based on Feedback with Carry Shift Register

Self-shrinking Bit Generation Algorithm Based on Feedback with Carry Shift Register Advanced Studies in Theoretical Physics Vol. 8, 2014, no. 24, 1057-1061 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/astp.2014.49132 Self-shrinking Bit Generation Algorithm Based on Feedback

More information

RECIPROCITY LAWS JEREMY BOOHER

RECIPROCITY LAWS JEREMY BOOHER RECIPROCITY LAWS JEREMY BOOHER 1 Introduction The law of uadratic recirocity gives a beautiful descrition of which rimes are suares modulo Secial cases of this law going back to Fermat, and Euler and Legendre

More information

A Family of Binary Sequences from Interleaved Construction and their Cryptographic Properties

A Family of Binary Sequences from Interleaved Construction and their Cryptographic Properties Contemorary Mathematics A Family of Binary Sequences from Interleaed Construction and their Crytograhic Proerties Jing Jane He, Daniel Panario, and Qiang Wang Abstract. Families of seudorandom sequences

More information

On Nonlinear Polynomial Selection and Geometric Progression (mod N) for Number Field Sieve

On Nonlinear Polynomial Selection and Geometric Progression (mod N) for Number Field Sieve On onlinear Polynomial Selection and Geometric Progression (mod ) for umber Field Sieve amhun Koo, Gooc Hwa Jo, and Soonhak Kwon Email: komaton@skku.edu, achimheasal@nate.com, shkwon@skku.edu Det. of Mathematics,

More information

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of

More information

ON THE SET a x + b g x (mod p) 1 Introduction

ON THE SET a x + b g x (mod p) 1 Introduction PORTUGALIAE MATHEMATICA Vol 59 Fasc 00 Nova Série ON THE SET a x + b g x (mod ) Cristian Cobeli, Marian Vâjâitu and Alexandru Zaharescu Abstract: Given nonzero integers a, b we rove an asymtotic result

More information

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): 10.

University of Bristol - Explore Bristol Research. Peer reviewed version. Link to published version (if available): 10. Booker, A. R., & Pomerance, C. (07). Squarefree smooth numbers and Euclidean rime generators. Proceedings of the American Mathematical Society, 45(), 5035-504. htts://doi.org/0.090/roc/3576 Peer reviewed

More information

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS CASEY BRUCK 1. Abstract The goal of this aer is to rovide a concise way for undergraduate mathematics students to learn about how rime numbers behave

More information

Gaps in Semigroups. Université Pierre et Marie Curie, Paris 6, Equipe Combinatoire - Case 189, 4 Place Jussieu Paris Cedex 05, France.

Gaps in Semigroups. Université Pierre et Marie Curie, Paris 6, Equipe Combinatoire - Case 189, 4 Place Jussieu Paris Cedex 05, France. Gas in Semigrous J.L. Ramírez Alfonsín Université Pierre et Marie Curie, Paris 6, Equie Combinatoire - Case 189, 4 Place Jussieu Paris 755 Cedex 05, France. Abstract In this aer we investigate the behaviour

More information

Applicable Analysis and Discrete Mathematics available online at HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS

Applicable Analysis and Discrete Mathematics available online at   HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS Alicable Analysis and Discrete Mathematics available online at htt://efmath.etf.rs Al. Anal. Discrete Math. 4 (010), 3 44. doi:10.98/aadm1000009m HENSEL CODES OF SQUARE ROOTS OF P-ADIC NUMBERS Zerzaihi

More information

NUMBER SYSTEMS. Number theory is the study of the integers. We denote the set of integers by Z:

NUMBER SYSTEMS. Number theory is the study of the integers. We denote the set of integers by Z: NUMBER SYSTEMS Number theory is the study of the integers. We denote the set of integers by Z: Z = {..., 3, 2, 1, 0, 1, 2, 3,... }. The integers have two oerations defined on them, addition and multilication,

More information

TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES

TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES Khayyam J. Math. DOI:10.22034/kjm.2019.84207 TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES ISMAEL GARCÍA-BAYONA Communicated by A.M. Peralta Abstract. In this aer, we define two new Schur and

More information

CDH/DDH-Based Encryption. K&L Sections , 11.4.

CDH/DDH-Based Encryption. K&L Sections , 11.4. CDH/DDH-Based Encrytion K&L Sections 8.3.1-8.3.3, 11.4. 1 Cyclic grous A finite grou G of order q is cyclic if it has an element g of q. { 0 1 2 q 1} In this case, G = g = g, g, g,, g ; G is said to be

More information

Practice Final Solutions

Practice Final Solutions Practice Final Solutions 1. True or false: (a) If a is a sum of three squares, and b is a sum of three squares, then so is ab. False: Consider a 14, b 2. (b) No number of the form 4 m (8n + 7) can be written

More information

By Evan Chen OTIS, Internal Use

By Evan Chen OTIS, Internal Use Solutions Notes for DNY-NTCONSTRUCT Evan Chen January 17, 018 1 Solution Notes to TSTST 015/5 Let ϕ(n) denote the number of ositive integers less than n that are relatively rime to n. Prove that there

More information

A secure approach for embedding message text on an elliptic curve defined over prime fields, and building 'EC-RSA-ELGamal' Cryptographic System

A secure approach for embedding message text on an elliptic curve defined over prime fields, and building 'EC-RSA-ELGamal' Cryptographic System International Journal of Comuter Science an Information Security (IJCSIS), Vol. 5, No. 6, June 7 A secure aroach for embeing message tet on an ellitic curve efine over rime fiels, an builing 'EC-RSA-ELGamal'

More information

Finite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking

Finite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking Finite-State Verification or Model Checking Finite State Verification (FSV) or Model Checking Holds the romise of roviding a cost effective way of verifying imortant roerties about a system Not all faults

More information

Efficient Cryptosystems From 2 k -th Power Residue Symbols

Efficient Cryptosystems From 2 k -th Power Residue Symbols Published in Journal of Crytology, 30(2:519 549, 2017. Efficient Crytosystems From 2 k -th Power Residue Symbols Fabrice Benhamouda 1, Javier Herranz 2, Marc Joye 3, and Benoît Libert 4, 1 ES Paris, CRS,

More information

Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences

Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences Cubic Sieve Congruence of the Discrete Logarithm Problem, and Fractional Part Sequences Srinivas Vivek University of Luxembourg, Luxembourg C. E. Veni Madhavan Deartment of Comuter Science and Automation,

More information

Multiplicative group law on the folium of Descartes

Multiplicative group law on the folium of Descartes Multilicative grou law on the folium of Descartes Steluţa Pricoie and Constantin Udrişte Abstract. The folium of Descartes is still studied and understood today. Not only did it rovide for the roof of

More information

DISCRIMINANTS IN TOWERS

DISCRIMINANTS IN TOWERS DISCRIMINANTS IN TOWERS JOSEPH RABINOFF Let A be a Dedekind domain with fraction field F, let K/F be a finite searable extension field, and let B be the integral closure of A in K. In this note, we will

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

ARITHMETIC PROGRESSIONS OF POLYGONAL NUMBERS WITH COMMON DIFFERENCE A POLYGONAL NUMBER

ARITHMETIC PROGRESSIONS OF POLYGONAL NUMBERS WITH COMMON DIFFERENCE A POLYGONAL NUMBER #A43 INTEGERS 17 (2017) ARITHMETIC PROGRESSIONS OF POLYGONAL NUMBERS WITH COMMON DIFFERENCE A POLYGONAL NUMBER Lenny Jones Deartment of Mathematics, Shiensburg University, Shiensburg, Pennsylvania lkjone@shi.edu

More information

Research Article New Mixed Exponential Sums and Their Application

Research Article New Mixed Exponential Sums and Their Application Hindawi Publishing Cororation Alied Mathematics, Article ID 51053, ages htt://dx.doi.org/10.1155/01/51053 Research Article New Mixed Exonential Sums and Their Alication Yu Zhan 1 and Xiaoxue Li 1 DeartmentofScience,HetaoCollege,Bayannur015000,China

More information

Class Numbers and Iwasawa Invariants of Certain Totally Real Number Fields

Class Numbers and Iwasawa Invariants of Certain Totally Real Number Fields Journal of Number Theory 79, 249257 (1999) Article ID jnth.1999.2433, available online at htt:www.idealibrary.com on Class Numbers and Iwasawa Invariants of Certain Totally Real Number Fields Dongho Byeon

More information

The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001

The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001 The Hasse Minkowski Theorem Lee Dicker University of Minnesota, REU Summer 2001 The Hasse-Minkowski Theorem rovides a characterization of the rational quadratic forms. What follows is a roof of the Hasse-Minkowski

More information

Research Article A New Sum Analogous to Gauss Sums and Its Fourth Power Mean

Research Article A New Sum Analogous to Gauss Sums and Its Fourth Power Mean e Scientific World Journal, Article ID 139725, ages htt://dx.doi.org/10.1155/201/139725 Research Article A New Sum Analogous to Gauss Sums and Its Fourth Power Mean Shaofeng Ru 1 and Weneng Zhang 2 1 School

More information

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3 Pesquisa Oeracional (2013) 33(1): 123-132 2013 Brazilian Oerations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/oe SOME RESULTS ABOUT THE CONNECTIVITY OF

More information

Verifying Two Conjectures on Generalized Elite Primes

Verifying Two Conjectures on Generalized Elite Primes 1 2 3 47 6 23 11 Journal of Integer Sequences, Vol. 12 (2009), Article 09.4.7 Verifying Two Conjectures on Generalized Elite Primes Xiaoqin Li 1 Mathematics Deartment Anhui Normal University Wuhu 241000,

More information

Prime Reciprocal Digit Frequencies and the Euler Zeta Function

Prime Reciprocal Digit Frequencies and the Euler Zeta Function Prime Recirocal Digit Frequencies and the Euler Zeta Function Subhash Kak. The digit frequencies for rimes are not all equal. The least significant digit for rimes greater than 5 can only be, 3, 7, or

More information

ON POLYNOMIAL SELECTION FOR THE GENERAL NUMBER FIELD SIEVE

ON POLYNOMIAL SELECTION FOR THE GENERAL NUMBER FIELD SIEVE MATHEMATICS OF COMPUTATIO Volume 75, umber 256, October 26, Pages 237 247 S 25-5718(6)187-9 Article electronically ublished on June 28, 26 O POLYOMIAL SELECTIO FOR THE GEERAL UMBER FIELD SIEVE THORSTE

More information

A Block Cipher Involving a Key and a Key Bunch Matrix, Supplemented with Key-Based Permutation and Substitution

A Block Cipher Involving a Key and a Key Bunch Matrix, Supplemented with Key-Based Permutation and Substitution (IJACSA) International Journal of Advanced Comuter Science and Alications, Vol. 4, No., 0 A Block Ciher Involving a Key and a Key Bunch Matrix, Sulemented with Key-Based Permutation and Substitution Dr.

More information

Improved Hidden Vector Encryption with Short Ciphertexts and Tokens

Improved Hidden Vector Encryption with Short Ciphertexts and Tokens Imroved Hidden Vector Encrytion with Short Cihertexts and Tokens Kwangsu Lee Dong Hoon Lee Abstract Hidden vector encrytion HVE) is a articular kind of redicate encrytion that is an imortant crytograhic

More information

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1) CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,

More information

Efficient Cryptosystems From 2 k -th Power Residue Symbols

Efficient Cryptosystems From 2 k -th Power Residue Symbols Efficient Crytosystems From 2 k -th Power Residue Symbols Marc Joye and Benoît Libert Technicolor 975 avenue des Chams Blancs, 35576 Cesson-Sévigné Cedex, France {marc.joye,benoit.libert}@technicolor.com

More information

A construction of bent functions from plateaued functions

A construction of bent functions from plateaued functions A construction of bent functions from lateaued functions Ayca Cesmelioglu, Wilfried Meidl To cite this version: Ayca Cesmelioglu, Wilfried Meidl. A construction of bent functions from lateaued functions.

More information

Efficient Cryptosystems From 2 k -th Power Residue Symbols

Efficient Cryptosystems From 2 k -th Power Residue Symbols Efficient Crytosystems From k -th Power Residue Symbols Fabrice Benhamouda, Javier Herranz, Marc Joye 3, and Benoît Libert 4, ENS Paris, CNRS, INRIA, and PSL 45 rue d Ulm, 7530 Paris Cedex 06, France fabrice.benhamouda@ens.fr

More information

2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized

2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized BIT 38 :2 (998), 283{292. QUASI-MONTE CARLO METHODS FOR NUMERICAL INTEGRATION OF MULTIVARIATE HAAR SERIES II KARL ENTACHER y Deartment of Mathematics, University of Salzburg, Hellbrunnerstr. 34 A-52 Salzburg,

More information

Idempotent Elements in Quaternion Rings over Z p

Idempotent Elements in Quaternion Rings over Z p International Journal of Algebra, Vol. 6, 01, no. 5, 9-5 Idemotent Elements in Quaternion Rings over Z Michael Aristidou American University of Kuwait Deartment of Science and Engineering P.O. Box 333,

More information

A SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES. Zhaneta Tasheva

A SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES. Zhaneta Tasheva JOURNAL SCIENCE EDUCATION INNOVATION, VOL. 2. 2014 Association Scientific and Applied Research International Journal Original Contribution ISSN 1314-9784 A SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES

More information

Bilinear Entropy Expansion from the Decisional Linear Assumption

Bilinear Entropy Expansion from the Decisional Linear Assumption Bilinear Entroy Exansion from the Decisional Linear Assumtion Lucas Kowalczyk Columbia University luke@cs.columbia.edu Allison Bisho Lewko Columbia University alewko@cs.columbia.edu Abstract We develo

More information

Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products

Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products Predicate Encrytion Suorting Disjunctions, Polynomial Equations, and Inner Products Jonathan Katz jkatz@cs.umd.edu Amit Sahai sahai@cs.ucla.edu Brent Waters bwaters@csl.sri.com Abstract Predicate encrytion

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

HASSE INVARIANTS FOR THE CLAUSEN ELLIPTIC CURVES

HASSE INVARIANTS FOR THE CLAUSEN ELLIPTIC CURVES HASSE INVARIANTS FOR THE CLAUSEN ELLIPTIC CURVES AHMAD EL-GUINDY AND KEN ONO Astract. Gauss s F x hyergeometric function gives eriods of ellitic curves in Legendre normal form. Certain truncations of this

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

DIRICHLET S THEOREM ON PRIMES IN ARITHMETIC PROGRESSIONS. 1. Introduction

DIRICHLET S THEOREM ON PRIMES IN ARITHMETIC PROGRESSIONS. 1. Introduction DIRICHLET S THEOREM ON PRIMES IN ARITHMETIC PROGRESSIONS INNA ZAKHAREVICH. Introduction It is a well-known fact that there are infinitely many rimes. However, it is less clear how the rimes are distributed

More information

#A6 INTEGERS 15A (2015) ON REDUCIBLE AND PRIMITIVE SUBSETS OF F P, I. Katalin Gyarmati 1.

#A6 INTEGERS 15A (2015) ON REDUCIBLE AND PRIMITIVE SUBSETS OF F P, I. Katalin Gyarmati 1. #A6 INTEGERS 15A (015) ON REDUCIBLE AND PRIMITIVE SUBSETS OF F P, I Katalin Gyarmati 1 Deartment of Algebra and Number Theory, Eötvös Loránd University and MTA-ELTE Geometric and Algebraic Combinatorics

More information

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen

More information

IDENTIFYING CONGRUENCE SUBGROUPS OF THE MODULAR GROUP

IDENTIFYING CONGRUENCE SUBGROUPS OF THE MODULAR GROUP PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 24, Number 5, May 996 IDENTIFYING CONGRUENCE SUBGROUPS OF THE MODULAR GROUP TIM HSU (Communicated by Ronald M. Solomon) Abstract. We exhibit a simle

More information

Characteristics of Fibonacci-type Sequences

Characteristics of Fibonacci-type Sequences Characteristics of Fibonacci-tye Sequences Yarden Blausa May 018 Abstract This aer resents an exloration of the Fibonacci sequence, as well as multi-nacci sequences and the Lucas sequence. We comare and

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information