Stream Ciphers and Number Theory
|
|
- Sharleen Underwood
- 5 years ago
- Views:
Transcription
1 Stream Ciphers and Number Theory Revised Edition Thomas W. Cusick The State University of New York at Buffalo, NY, U.S.A. Cunsheng Ding The Hong Kong University of Science and Technology China Ari Renvall The University of Turku Finland ELSEVIER 2004 Amsterdam - Boston - Heidelberg - London - New York - Oxford Paris - San Diego -San Francisco - Singapore - Sydney - Tokyo
2 Contents Preface to the Revised Edition Preface to the First Edition vii ix 1 Introduction Applications of Number Theory An Outline of this Book 5 2 Stream Ciphers Stream Cipher Systems Additive Synchronous Stream Ciphers Additive Self-Synchronous Stream Ciphers Nonadditive Synchronous Stream Ciphers Stream Ciphering with Block Ciphers Cooperatively Distributed Ciphering Some Keystream Generators Generators Based on Counters Some Number-Theoretic Generators Cryptographic Aspects of Sequences Minimal Polynomial and Linear Complexity Pattern Distribution of Key Streams Correlation Functions Sphere Complexity and Linear Cryptanalysis Higher Order Complexities Harmony of Binary NSGs Security and Attacks 41 3 Primes, Primitive Roots and Sequences Cyclotomic Polynomials Two Basic Problems from Stream Ciphers 47 XI
3 xii Contents 3.3 A Basic Theorem and Main Bridge Primes, Primitive Roots and Binary Sequences Primes, Primitive Roots and Ternary Sequences Primes, Negord and Sequences Prime Powers, Primitive Roots and Sequences Prime Products and Sequences Binary Sequences and Primes Ternary Sequences and Primes On Cryptographic Primitive Roots Linear Complexity of Sequences over Z m Period and its Cryptographic Importance Recent Advances on the Sphere Complexity 80 4 Cyclotomy and Cryptographic Functions Cyclotomic Numbers Cyclotomy and Cryptography Cyclotomy and Difference Parameters Cyclotomy and the Differential Cryptanalysis Cryptographic Cyclotomic Numbers Cryptographic Functions from Z p to Z& The Case d = The Case d = The Case d = The Case d = The Case d = The Case d = The Case d = The Case d = Cryptographic Functions from Z pq to Zd Whiteman's Generalized Cyclotomy and Cryptography Cryptographic Functions from Z pg to Zi Cryptographic Functions from Z vq to Z\ Cryptographic Functions from Z p i to Zi Ill 4.6 Cryptographic Functions Defined on GF(p m ) The Origin of Cyclotomic Numbers Special Primes and Sequences Sophie Germain Primes and Sequences Their Importance in Stream Ciphers Their Relations with Other Number-theoretic Problemsl The Existence Problem A Search for Cryptographic Sophie Germain Primes. 124
4 Contents xiii 5.2 Tchebychef Primes and Sequences Their Cryptographic Significance Existence and Search Problem Other Primes of Form fc x 2 n + 1 and Sequences Primes of Form (o n l)/(o 1) and Sequences Mersenne Primes and Sequences Cryptographic Primes of Form ((4u) n - l)/(4w - 1) Prime Repunits and their Cryptographic Values n\ ± 1 and p# ± 1 Primes and Sequences Twin Primes and Sequences over GF(2) The Significance of Twins and their Sexes Cryptographic Twins and the Sex Distribution Twin Primes and Sequences over GF(3) Other Special Primes and Sequences Prime Distributions and their Significance Primes for Stream Ciphers and for RSA Highly Nonlinear Functions Preliminaries Functions with perfect nonlinearity Stability of the set of perfect nonlinear functions under actions of general affine groups Perfect nonlinear functions and difference partitions Functions with perfect nonlinearity and difference matrices A characterization of perfect nonlinearity by means of Fourier transform Obtaining functions with perfect nonlinearity from known ones Bent functions and perfect nonlinearity Binary functions with optimum nonlinearity The case n = 0 (mod 4) The case n = 3 (mod 4) The case n = 2 (mod 4) The case n = 1 (mod 4) and n > Minimum distance from arbne functions Nonbinary functions with optimum nonlinearity The case \B\ = The case B = Constructions of functions with optimum nonlinearity Functions from {GF{q) n,+) to (GF(q),+) 176
5 xiv Contents Functions from (GF(q) n,+) to (GF(q) n,+): perfect and almost perfect nonlinear mappings Functions with optimum nonlinearity from linear functions Other functions from (GF(2 m )*,x) to (GF(2),+) with optimum nonlinearity Functions from ZJ to Z q Difference Sets and Sequences The NSG Realization of Sequences Differential Analysis of Sequences Linear Complexity of DSC (ADSC) Sequences Barker Sequences Binary Cyclotomic Generators Cyclotomic Generator of Order 2k Two-Prime Generator of Order Two-Prime Generator of Order Prime-Square Generator Implementation and Performance A Summary of Binary Cyclotomic Generators Analysis of Cyclotomic Generators of Order Crosscorrelation Property Decimation Property Linear Complexity Security against a Decision Tree Attack Sums of DSC Sequences Linear Complexity Analysis Balance Analysis Correlation Analysis Differential Analysis Nonbinary Cyclotomic Generators The rth-order Cyclotomic Generator Linear Complexity Autocorrelation Property Decimation Property Ideas Behind the Cyclotomic Generators 257
6 Contents xv 11 Generators Based on Permutations The Cryptographic Idea Permutations on Finite Fields Dickson Permutation Polynomials Linearized Permutation Polynomials Permutation Polynomials of the Form x(q+rn-i)/m + ax Permutation Polynomials of the Form x r (g{x 8 ))( q - 1)/s Cohen Permutation Polynomials A Generator Based on Inverse Permutations Binary Generators and Permutations of GF(2 n ) APN Permutations and their Properties Quadratic Permutations with Controllable Nonlinearity Permutations of Order APN Permutations of Order n Permutations of Order n Permutations X d with d = 2 m APN Permutations via Crosscorrelation Function Other Power Functions with Good Nonlinearity Choosing the Linear Functions Cyclic-Key Generators and their Problems Cyclic-Key Generators Several Specific Forms: An Overview A Generator Based on Permutations of Z m Quadratic Partitions and Cryptography Quadratic Partition and Cryptography p = x 2 + y 2 and p = x 2 + 4y p = x 2 + 2y 2 and p = x 2 + 3y p = x 2 + ny 2 and Quadratic Reciprocity p = x 2 + 7y 2 and Quadratic Forms p = x y 2 and Genus Theory p = x 2 + ny 2 and Class Field Theory Other Cryptographic Quadratic Partitions Group Characters and Cryptography Group Characters Field Characters and Cryptography Field Multiplicative Characters: Most Used Ones Field Additive Characters: Most Used Ones Group Characters and Cyclotomic Numbers The Nonlinearity of Characters The Nonlinearity of Multiplicative Characters 333
7 xvi Contents The Nonlinearity of Additive Characters Ring Characters and Cryptography P-Adic Numbers, Class Numbers and Sequences The 2-Adic Value and 2-Adic Expansion A Fast Algorithm for the 2-Adic Expansion The Arithmetic of Q [2 ] and Z [2 ] Feedback Shift Registers with Carry Analysis and Synthesis of FCSRs The 2-Adic Span and 2-RA Algorithm Some Properties of FCSR Sequences Blum-Blum-Shub Sequences & Class Numbers Prime Ciphering Algorithms Prime-32: A Description Theoretical Results about Prime Security Arguments Performance of Prime Prime-32 with a 192-Bit Key Prime Cryptographic Problems and Philosophies Nonlinearity and Linearity Stability and Instability Stability and Diffusion Correlation Stability and Pattern Stability Mutual Information Stability Localness and Globalness Goodness and Badness About Good plus Good About Good plus Bad About Bad plus Good Hardware and Software Model Complexity 404 Appendices 407 A More About Cyclotomic Numbers 407 A.I Cyclotomic Numbers of Order A.2 Cyclotomic Numbers of Orders 9, A.3 Cyclotomic Numbers of Order Eleven 410 A.4 On Other Cyclotomic Numbers 411 A.5 Behind Cyclotomic Numbers 411
8 Contents B Cyclotomic Formulae of Orders 6, 8 and 10 C Finding Practical Primes D List of Research Problems E Exercises F List of Mathematical Symbols Bibliography Index xvu
Cyclic Codes from the Two-Prime Sequences
Cunsheng Ding Department of Computer Science and Engineering The Hong Kong University of Science and Technology Kowloon, Hong Kong, CHINA May 2012 Outline of this Talk A brief introduction to cyclic codes
More informationBinary Sequences with Optimal Autocorrelation
Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA July 2004 The Autocorrelation Function The autocorrelation of a binary sequence {s(t)} of period N at shift w is C s (w) = ( 1) s(t+w) s(t). N 1 t=0 The
More informationBinary Additive Counter Stream Ciphers
Number Theory and Related Area ALM 27, pp. 1 23 c Higher Education Press and International Press Beijing Boston Binary Additive Counter Stream Ciphers Cunsheng Ding, Wenpei Si Abstract Although a number
More informationAlmost Difference Sets and Their Sequences With Optimal Autocorrelation
2934 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 7, NOVEMBER 2001 Almost Difference Sets Their Sequences With Optimal Autocorrelation K. T. Arasu, Cunsheng Ding, Member, IEEE, Tor Helleseth,
More informationGAME PHYSICS ENGINE DEVELOPMENT
GAME PHYSICS ENGINE DEVELOPMENT IAN MILLINGTON i > AMSTERDAM BOSTON HEIDELBERG fpf l LONDON. NEW YORK. OXFORD ^. PARIS SAN DIEGO SAN FRANCISCO втс^н Г^ 4.«Mt-fSSKHbe. SINGAPORE. SYDNEY. TOKYO ELSEVIER
More informationDigital Control Engineering Analysis and Design
Digital Control Engineering Analysis and Design M. Sami Fadali Antonio Visioli AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Academic Press is
More informationSTOCHASTIC PROCESSES IN PHYSICS AND CHEMISTRY
STOCHASTIC PROCESSES IN PHYSICS AND CHEMISTRY Third edition N.G. VAN KAMPEN Institute for Theoretical Physics of the University at Utrecht ELSEVIER Amsterdam Boston Heidelberg London New York Oxford Paris
More informationBinary Sequences with Optimal Autocorrelation
Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA September 2008 Outline of this talk Difference sets and almost difference sets Cyclotomic classes Introduction of binary sequences with optimal autocorrelation
More informationIntegrated Arithmetic and Basic Algebra
211 771 406 III T H I R D E D I T I O N Integrated Arithmetic and Basic Algebra Bill E. Jordan Seminole Community College William P. Palow Miami-Dade College Boston San Francisco New York London Toronto
More informationCryptography. Number Theory with AN INTRODUCTION TO. James S. Kraft. Lawrence C. Washington. CRC Press
AN INTRODUCTION TO Number Theory with Cryptography James S Kraft Gilman School Baltimore, Maryland, USA Lawrence C Washington University of Maryland College Park, Maryland, USA CRC Press Taylor & Francis
More informationA Classical Introduction to Modern Number Theory
Kenneth Ireland Michael Rosen A Classical Introduction to Modern Number Theory Second Edition Springer Contents Preface to the Second Edition Preface v vii CHAPTER 1 Unique Factorization 1 1 Unique Factorization
More informationSystem Dynamics for Engineering Students Concepts and Applications
System Dynamics for Engineering Students Concepts and Applications Nicolae Lobontiu University of Alaska Anchorage "Ж AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE
More informationThe Hydraulics of Open Channel Flow: An Introduction
The Hydraulics of Open Channel Flow: An Introduction Basic principles, sediment motion, hydraulic modelling, design of hydraulic structures Second Edition Hubert Chanson Department of Civil Engineering
More informationThe Array Structure of Modified Jacobi Sequences
Journal of Mathematics Research; Vol. 6, No. 1; 2014 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education The Array Structure of Modified Jacobi Sequences Shenghua Li 1,
More informationBoundary. DIFFERENTIAL EQUATIONS with Fourier Series and. Value Problems APPLIED PARTIAL. Fifth Edition. Richard Haberman PEARSON
APPLIED PARTIAL DIFFERENTIAL EQUATIONS with Fourier Series and Boundary Value Problems Fifth Edition Richard Haberman Southern Methodist University PEARSON Boston Columbus Indianapolis New York San Francisco
More informationarxiv: v1 [cs.it] 31 May 2013
Noname manuscript No. (will be inserted by the editor) A Note on Cyclic Codes from APN Functions Chunming Tang Yanfeng Qi Maozhi Xu arxiv:1305.7294v1 [cs.it] 31 May 2013 Received: date / Accepted: date
More informationCollege Algebra. Third Edition. Concepts Through Functions. Michael Sullivan. Michael Sullivan, III. Chicago State University. Joliet Junior College
College Algebra Concepts Through Functions Third Edition Michael Sullivan Chicago State University Michael Sullivan, III Joliet Junior College PEARSON Boston Columbus Indianapolis New York San Francisco
More informationALGEBRAIC SHIFT REGISTER SEQUENCES
ALGEBRAIC SHIFT REGISTER SEQUENCES Pseudo-random sequences are essential ingredients of every modern digital communication system including cellular telephones, GPS, secure internet transactions, and satellite
More informationThe Differential Cryptanalysis and Design of Natural Stream Ciphers
The Differential Cryptanalysis and Design of Natural Stream Ciphers Cunsheng Ding Buchenring 15B D-76297 Stutensee-Buechig, Germany Abstract. This paper introduces the differential cryptanalysis of additive
More informationAPPLIED PARTIAL DIFFERENTIAL EQUATIONS
APPLIED PARTIAL DIFFERENTIAL EQUATIONS AN I N T R O D U C T I O N ALAN JEFFREY University of Newcastle-upon-Tyne ACADEMIC PRESS An imprint of Elsevier Science Amsterdam Boston London New York Oxford Paris
More informationGeneralized hyper-bent functions over GF(p)
Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G
More informationAn Invitation to Modern Number Theory. Steven J. Miller and Ramin Takloo-Bighash PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD
An Invitation to Modern Number Theory Steven J. Miller and Ramin Takloo-Bighash PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Contents Foreword Preface Notation xi xiii xix PART 1. BASIC NUMBER THEORY
More informationThe New Book of Prime Number Records
Paulo Ribenboim The New Book of Prime Number Records Springer Contents Preface Guiding the Reader Index of Notations ix xv xvii Introduction 1 CHARTER 1 How Many Prime Numbers Are There? 3 I. Euclid's
More informationCHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S. Ant nine J aux
CHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S Ant nine J aux (g) CRC Press Taylor 8* Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor &
More informationStephen Cohen, University of Glasgow Methods for primitive and normal polynomials
Stephen Cohen, University of Glasgow Methods for primitive and normal polynomials Primitive and normal polynomials over a finite field are, of course, particular examples of irreducible polynomials over
More informationGAME PHYSICS SECOND EDITION. дяййтаййг 1 *
GAME PHYSICS SECOND EDITION DAVID H. EBERLY дяййтаййг 1 * К AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO MORGAN ELSEVIER Morgan Kaufmann Publishers
More informationA SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES. Zhaneta Tasheva
JOURNAL SCIENCE EDUCATION INNOVATION, VOL. 2. 2014 Association Scientific and Applied Research International Journal Original Contribution ISSN 1314-9784 A SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES
More informationDIFFERENTIAL EQUATIONS, DYNAMICAL SYSTEMS, AND AN INTRODUCTION TO CHAOS
DIFFERENTIAL EQUATIONS, DYNAMICAL SYSTEMS, AND AN INTRODUCTION TO CHAOS Morris W. Hirsch University of California, Berkeley Stephen Smale University of California, Berkeley Robert L. Devaney Boston University
More informationDifferential Equations with Mathematica
Differential Equations with Mathematica THIRD EDITION Martha L. Abell James P. Braselton ELSEVIER ACADEMIC PRESS Amsterdam Boston Heidelberg London New York Oxford Paris San Diego San Francisco Singapore
More informationNON-LINEAR COMPLEXITY OF THE NAOR REINGOLD PSEUDO-RANDOM FUNCTION
NON-LINEAR COMPLEXITY OF THE NAOR REINGOLD PSEUDO-RANDOM FUNCTION William D. Banks 1, Frances Griffin 2, Daniel Lieman 3, Igor E. Shparlinski 4 1 Department of Mathematics, University of Missouri Columbia,
More informationThesis Research Notes
Thesis Research Notes Week 26-2012 Christopher Wood June 29, 2012 Abstract This week was devoted to reviewing some classical literature on the subject of Boolean functions and their application to cryptography.
More informationKnow the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].
The second exam will be on Friday, October 28, 2. It will cover Sections.7,.8, 3., 3.2, 3.4 (except 3.4.), 4. and 4.2 plus the handout on calculation of high powers of an integer modulo n via successive
More informationStatistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study
International Journal of Foundations of Computer Science c World Scientific Publishing Company Statistical Properties of the Arithmetic Correlation of Sequences Mark Goresky School of Mathematics Institute
More informationPeriodicity and Distribution Properties of Combined FCSR Sequences
Periodicity and Distribution Properties of Combined FCSR Sequences Mark Goresky 1, and Andrew Klapper, 1 Institute for Advanced Study, Princeton NJ www.math.ias.edu/~goresky Dept. of Computer Science,
More informationFunctions on Finite Fields, Boolean Functions, and S-Boxes
Functions on Finite Fields, Boolean Functions, and S-Boxes Claude Shannon Institute www.shannoninstitute.ie and School of Mathematical Sciences University College Dublin Ireland 1 July, 2013 Boolean Function
More informationFast correlation attacks on certain stream ciphers
FSE 2011, February 14-16, Lyngby, Denmark Fast correlation attacks on certain stream ciphers Willi Meier FHNW Switzerland 1 Overview A decoding problem LFSR-based stream ciphers Correlation attacks Fast
More informationSome Results on the Arithmetic Correlation of Sequences
Some Results on the Arithmetic Correlation of Sequences Mark Goresky Andrew Klapper Abstract In this paper we study various properties of arithmetic correlations of sequences. Arithmetic correlations are
More informationSequences, DFT and Resistance against Fast Algebraic Attacks
Sequences, DFT and Resistance against Fast Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca
More informationChapter 4 Mathematics of Cryptography
Chapter 4 Mathematics of Cryptography Part II: Algebraic Structures Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 4.1 Chapter 4 Objectives To review the concept
More informationGEOPHYSICAL INVERSE THEORY AND REGULARIZATION PROBLEMS
Methods in Geochemistry and Geophysics, 36 GEOPHYSICAL INVERSE THEORY AND REGULARIZATION PROBLEMS Michael S. ZHDANOV University of Utah Salt Lake City UTAH, U.S.A. 2OO2 ELSEVIER Amsterdam - Boston - London
More informationCodes and Cryptography. Jorge L. Villar. MAMME, Fall 2015 PART XII
Codes and Cryptography MAMME, Fall 2015 PART XII Outline 1 Symmetric Encryption (II) 2 Construction Strategies Construction Strategies Stream ciphers: For arbitrarily long messages (e.g., data streams).
More informationFundamentals of Applied Probability and Random Processes
Fundamentals of Applied Probability and Random Processes,nd 2 na Edition Oliver C. Ibe University of Massachusetts, LoweLL, Massachusetts ip^ W >!^ AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS
More informationConstructing a Ternary FCSR with a Given Connection Integer
Constructing a Ternary FCSR with a Given Connection Integer Lin Zhiqiang 1,2 and Pei Dingyi 1,2 1 School of Mathematics and Information Sciences, Guangzhou University, China 2 State Key Laboratory of Information
More informationSTREAM CIPHER. Chapter - 3
STREAM CIPHER Chapter - 3 S t r e a m C i p h e r P a g e 38 S t r e a m C i p h e r P a g e 39 STREAM CIPHERS Stream cipher is a class of symmetric key algorithm that operates on individual bits or bytes.
More informationLecture Notes. Advanced Discrete Structures COT S
Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-27 Recap ADFGX Cipher Block Cipher Modes of Operation Hill Cipher Inverting a Matrix (mod n) Encryption: Hill Cipher Example Multiple
More informationSome approaches to construct MDS matrices over a finite field
2017 6 Å 31 Å 2 ¹ June 2017 Communication on Applied Mathematics and Computation Vol.31 No.2 DOI 10.3969/j.issn.1006-6330.2017.02.001 Some approaches to construct MDS matrices over a finite field BELOV
More informationTrace Representation of Legendre Sequences
C Designs, Codes and Cryptography, 24, 343 348, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Trace Representation of Legendre Sequences JEONG-HEON KIM School of Electrical and
More informationSelf-shrinking Bit Generation Algorithm Based on Feedback with Carry Shift Register
Advanced Studies in Theoretical Physics Vol. 8, 2014, no. 24, 1057-1061 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/astp.2014.49132 Self-shrinking Bit Generation Algorithm Based on Feedback
More informationDIFFERENTIAL EQUATIONS, DYNAMICAL SYSTEMS, AND AN INTRODUCTION TO CHAOS
DIFFERENTIAL EQUATIONS, DYNAMICAL SYSTEMS, AND AN INTRODUCTION TO CHAOS Morris W. Hirsch University of California, Berkeley Stephen Smale University of California, Berkeley Robert L. Devaney Boston University
More informationMaximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers
Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Muxiang Zhang 1 and Agnes Chan 2 1 GTE Laboratories Inc., 40 Sylvan Road LA0MS59, Waltham, MA 02451 mzhang@gte.com 2 College of Computer
More informationOther Public-Key Cryptosystems
Other Public-Key Cryptosystems Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/
More informationIntroduction to Economic Geography
Introduction to Economic Geography Globalization, Uneven Development and Place 2nd edition Danny MacKinnon and Andrew Cumbers Harlow, England London New York Boston San Francisco Toronto Sydney Singapore
More informationExploring Monte Carlo Methods
Exploring Monte Carlo Methods William L Dunn J. Kenneth Shultis AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO ELSEVIER Academic Press Is an imprint
More informationEnvironmental Hydraulics of Open Channel Flows
Environmental Hydraulics of Open Channel Flows Hubert Chanson ME, ENSHM Grenoble, INSTN, PhD (Cant), DEng (Qld) Eur Ing, MIEAust, MIAHR 13th Arthur Ippen awardee (IAHR) Reader in Environmental Fluid Mechanics
More informationPermutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1
Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1 Kwangsu Lee A Thesis for the Degree of Master of Science Division of Computer Science, Department
More informationModified Alternating Step Generators
Modified Alternating Step Generators Robert Wicik, Tomasz Rachwalik Military Communication Institute Warszawska 22A, 05-130 Zegrze, Poland {r.wicik, t.rachwalik}@wil.waw.pl Abstract. Irregular clocking
More informationEssentials of College Algebra
Essentials of College Algebra For these Global Editions, the editorial team at Pearson has collaborated with educators across the world to address a wide range of subjects and requirements, equipping students
More informationClassical Cryptography
Classical Cryptography CSG 252 Fall 2006 Riccardo Pucella Goals of Cryptography Alice wants to send message X to Bob Oscar is on the wire, listening to communications Alice and Bob share a key K Alice
More informationAn Introduction to Stochastic Modeling
F An Introduction to Stochastic Modeling Fourth Edition Mark A. Pinsky Department of Mathematics Northwestern University Evanston, Illinois Samuel Karlin Department of Mathematics Stanford University Stanford,
More informationFundamentals of Nuclear Reactor Physics
Fundamentals of Nuclear Reactor Physics E. E. Lewis Professor of Mechanical Engineering McCormick School of Engineering and Applied Science Northwestern University AMSTERDAM BOSTON HEIDELBERG LONDON NEW
More informationALGEBRA AND ALGEBRAIC COMPUTING ELEMENTS OF. John D. Lipson. Addison-Wesley Publishing Company, Inc.
ELEMENTS OF ALGEBRA AND ALGEBRAIC COMPUTING John D. Lipson University of Toronto PRO Addison-Wesley Publishing Company, Inc. Redwood City, California Menlo Park, California Reading, Massachusetts Amsterdam
More informationFeature Extraction and Image Processing
Feature Extraction and Image Processing Second edition Mark S. Nixon Alberto S. Aguado :*авш JBK IIP AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO
More informationPseudorandom Generators
Outlines Saint Petersburg State University, Mathematics and Mechanics 2nd April 2005 Outlines Part I: Main Approach Part II: Blum-Blum-Shub Generator Part III: General Concepts of Pseudorandom Generator
More informationFinite Fields. SOLUTIONS Network Coding - Prof. Frank H.P. Fitzek
Finite Fields In practice most finite field applications e.g. cryptography and error correcting codes utilizes a specific type of finite fields, namely the binary extension fields. The following exercises
More informationB. Encryption using quasigroup
Sequence Randomization Using Quasigroups and Number Theoretic s Vaignana Spoorthy Ella Department of Computer Science Oklahoma State University Stillwater, Oklahoma, USA spoorthyella@okstateedu Abstract
More informationQuasi-reducible Polynomials
Quasi-reducible Polynomials Jacques Willekens 06-Dec-2008 Abstract In this article, we investigate polynomials that are irreducible over Q, but are reducible modulo any prime number. 1 Introduction Let
More informationRELATION ALGEBRAS. Roger D. MADDUX. Department of Mathematics Iowa State University Ames, Iowa USA ELSEVIER
RELATION ALGEBRAS Roger D. MADDUX Department of Mathematics Iowa State University Ames, Iowa 50011 USA ELSEVIER AMSTERDAM. BOSTON HEIDELBERG LONDON NEW YORK. OXFORD PARIS SAN DIEGO. SAN FRANCISCO. SINGAPORE.
More informationEXPONENTIAL SUMS EQUIDISTRIBUTION
EXPONENTIAL SUMS EQUIDISTRIBUTION PSEUDORANDOMNESS (1) Exponential sums over subgroups General philosophy: multiplicative subgroups are well-distributed even if they are very small Conjecture. (M-V-W)
More informationSecret-sharing with a class of ternary codes
Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,
More informationBreaking the F-FCSR-H Stream Cipher in Real Time
Breaking the F-FCSR-H Stream Cipher in Real Time Martin Hell and Thomas Johansson Dept. of Electrical and Information Technology, Lund University, P.O. Box 118, 221 00 Lund, Sweden Abstract. The F-FCSR
More informationAnalysis of Some Quasigroup Transformations as Boolean Functions
M a t h e m a t i c a B a l k a n i c a New Series Vol. 26, 202, Fasc. 3 4 Analysis of Some Quasigroup Transformations as Boolean Functions Aleksandra Mileva Presented at MASSEE International Conference
More informationCODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.
CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES A selection of the following questions will be chosen by the lecturer to form the Cryptology Assignment. The Cryptology Assignment is due by 5pm Sunday 1
More informationTowards non-linear feedbacks
Towards non-linear feedbacks Who? Cédric Lauradoux When? December 2, 2008 Applications of sequences BPSK Data Carrier m t IV Init s n K k t f Φ Φ c t s 1 s n s 1 PRNG Spread spectrum Boolean functions
More informationFeedback with Carry Shift Registers over Finite Fields (Extended Abstract)
Feedback with Carry Shift Registers over Finite Fields (Extended Abstract) Andrew Klapper* Dept. of Computer Science 763H Anderson Hall University of Kentucky, Lexington KY 40506-0046 USA klapper@cs.uky.edu.
More informationCorrecting Codes in Cryptography
EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.
More informationAffine equivalence in the AES round function
Discrete Applied Mathematics 148 (2005) 161 170 www.elsevier.com/locate/dam Affine equivalence in the AES round function A.M. Youssef a, S.E. Tavares b a Concordia Institute for Information Systems Engineering,
More informationQuantum Mechanics: Foundations and Applications
Arno Böhm Quantum Mechanics: Foundations and Applications Third Edition, Revised and Enlarged Prepared with Mark Loewe With 96 Illustrations Springer-Verlag New York Berlin Heidelberg London Paris Tokyo
More informationA Polynomial Description of the Rijndael Advanced Encryption Standard
A Polynomial Description of the Rijndael Advanced Encryption Standard arxiv:cs/0205002v1 [cs.cr] 2 May 2002 Joachim Rosenthal Department of Mathematics University of Notre Dame Notre Dame, Indiana 46556,
More informationPrivate-key Systems. Block ciphers. Stream ciphers
Chapter 2 Stream Ciphers Further Reading: [Sim92, Chapter 2] 21 Introduction Remember classication: Private-key Systems Block ciphers Stream ciphers Figure 21: Private-key cipher classication Block Cipher:
More information50 Years of Crosscorrelation of m-sequences
50 Years of Crosscorrelation of m-sequences Tor Helleseth Selmer Center Department of Informatics University of Bergen Bergen, Norway August 29, 2017 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation
More informationBinary Cyclotomic Generators
Binary Cyclotomic Generators Cunsheng Ding* Department of Mathematics University of Turku Fin-20500 Turku, Finland cding@ra.abo.fi Abstract. In this paper a number of binary cyclotomic generators based
More informationc 2013 Society for Industrial and Applied Mathematics
SIAM J. DISCRETE MATH. Vol. 27, No. 4, pp. 1977 1994 c 2013 Society for Industrial and Applied Mathematics CYCLIC CODES FROM SOME MONOMIALS AND TRINOMIALS CUNSHENG DING Abstract. Cyclic codes are a subclass
More informationStream Ciphers: Cryptanalytic Techniques
Stream Ciphers: Cryptanalytic Techniques Thomas Johansson Department of Electrical and Information Technology. Lund University, Sweden ECRYPT Summer school 2007 (Lund University) Stream Ciphers: Cryptanalytic
More informationDesign of Pseudo-Random Spreading Sequences for CDMA Systems
Design of Pseudo-Random Spreading Sequences for CDMA Systems Jian Ren and Tongtong Li Department of Electrical and Computer Engineering Michigan State University, 2120 Engineering Building East Lansing,
More informationA New Characterization of Semi-bent and Bent Functions on Finite Fields
A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department
More informationTopic 3. Design of Sequences with Low Correlation
Topic 3. Design of Sequences with Low Correlation M-sequences and Quadratic Residue Sequences 2 Multiple Trace Term Sequences and WG Sequences 3 Gold-pair, Kasami Sequences, and Interleaved Sequences 4
More informationOn the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ ΕΚΘΕΣΗ 2010
Introduction Boolean functions 2nd order nonlinearity Summary ARXH PROSTASIAS_APOLOGISMOS 2010.indd 1 20/04/2011 12:54 ΜΜ On the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ
More information3.8 MEASURE OF RUNDOMNESS:
Lec 10 : Data Security Stream Cipher Systems 1 3.8 MEASURE OF RUNDOMNESS: 3.9.1 DEFINITION: Run: sequence of identical bits (0 or 1) Ex.01110000111 Runs are 0,111, 0000, 111 Gap: runs of zeroes 1000011
More informationSPHERICAL NEAR-FIELD ANTENNA MEASUREMENTS
SPHERICAL NEAR-FIELD ANTENNA MEASUREMENTS Edited by J.E.Hansen Peter Peregrinus Ltd. on behalf of the Institution of Electrical Engineers Contents Contributing authors listed Preface v xiii 1 Introduction
More informationDISCRETE-TIME SIGNAL PROCESSING
THIRD EDITION DISCRETE-TIME SIGNAL PROCESSING ALAN V. OPPENHEIM MASSACHUSETTS INSTITUTE OF TECHNOLOGY RONALD W. SCHÄFER HEWLETT-PACKARD LABORATORIES Upper Saddle River Boston Columbus San Francisco New
More informationStream ciphers I. Thomas Johansson. May 16, Dept. of EIT, Lund University, P.O. Box 118, Lund, Sweden
Dept. of EIT, Lund University, P.O. Box 118, 221 00 Lund, Sweden thomas@eit.lth.se May 16, 2011 Outline: Introduction to stream ciphers Distinguishers Basic constructions of distinguishers Various types
More informationPseudo-random Number Generation. Qiuliang Tang
Pseudo-random Number Generation Qiuliang Tang Random Numbers in Cryptography The keystream in the one-time pad The secret key in the DES encryption The prime numbers p, q in the RSA encryption The private
More informationOn the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,
More informationSubquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach
Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach M A Hasan 1 and C Negre 2 1 ECE Department and CACR, University of Waterloo, Ontario, Canada 2 Team
More informationTransform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and
Transform Domain Analysis of DES Guang Gong and Solomon W. Golomb Communication Sciences Institute University of Southern California Electrical Engineering-Systems, EEB # 500 Los Angeles, California 90089-2565
More informationNumerical Methods with MATLAB
Numerical Methods with MATLAB A Resource for Scientists and Engineers G. J. BÖRSE Lehigh University PWS Publishing Company I(T)P AN!NTERNATIONAL THOMSON PUBLISHING COMPANY Boston Albany Bonn Cincinnati
More informationOutline. 1 Arithmetic on Bytes and 4-Byte Vectors. 2 The Rijndael Algorithm. 3 AES Key Schedule and Decryption. 4 Strengths and Weaknesses of Rijndael
Outline CPSC 418/MATH 318 Introduction to Cryptography Advanced Encryption Standard Renate Scheidler Department of Mathematics & Statistics Department of Computer Science University of Calgary Based in
More informationEnergy Optimization in Process Systems. Warsaw University of TechnoLogy, Facuity of Chemical and Process Engineering, Warsaw, Poland ELSEVIER
Energy Optimization in Process Systems First Edition Stanistaw Sieniutycz Warsaw University of TechnoLogy, Facuity of Chemical and Process Engineering, Warsaw, Poland Jacek Jekowski Rzeszöw University
More informationSinger and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few
New Families of Ideal -level Autocorrelation Ternary Sequences From Second Order DHT Michael Ludkovski 1 and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,
More informationHands-on Matrix Algebra Using R
Preface vii 1. R Preliminaries 1 1.1 Matrix Defined, Deeper Understanding Using Software.. 1 1.2 Introduction, Why R?.................... 2 1.3 Obtaining R.......................... 4 1.4 Reference Manuals
More information