Stream Ciphers and Number Theory

Size: px
Start display at page:

Download "Stream Ciphers and Number Theory"

Transcription

1 Stream Ciphers and Number Theory Revised Edition Thomas W. Cusick The State University of New York at Buffalo, NY, U.S.A. Cunsheng Ding The Hong Kong University of Science and Technology China Ari Renvall The University of Turku Finland ELSEVIER 2004 Amsterdam - Boston - Heidelberg - London - New York - Oxford Paris - San Diego -San Francisco - Singapore - Sydney - Tokyo

2 Contents Preface to the Revised Edition Preface to the First Edition vii ix 1 Introduction Applications of Number Theory An Outline of this Book 5 2 Stream Ciphers Stream Cipher Systems Additive Synchronous Stream Ciphers Additive Self-Synchronous Stream Ciphers Nonadditive Synchronous Stream Ciphers Stream Ciphering with Block Ciphers Cooperatively Distributed Ciphering Some Keystream Generators Generators Based on Counters Some Number-Theoretic Generators Cryptographic Aspects of Sequences Minimal Polynomial and Linear Complexity Pattern Distribution of Key Streams Correlation Functions Sphere Complexity and Linear Cryptanalysis Higher Order Complexities Harmony of Binary NSGs Security and Attacks 41 3 Primes, Primitive Roots and Sequences Cyclotomic Polynomials Two Basic Problems from Stream Ciphers 47 XI

3 xii Contents 3.3 A Basic Theorem and Main Bridge Primes, Primitive Roots and Binary Sequences Primes, Primitive Roots and Ternary Sequences Primes, Negord and Sequences Prime Powers, Primitive Roots and Sequences Prime Products and Sequences Binary Sequences and Primes Ternary Sequences and Primes On Cryptographic Primitive Roots Linear Complexity of Sequences over Z m Period and its Cryptographic Importance Recent Advances on the Sphere Complexity 80 4 Cyclotomy and Cryptographic Functions Cyclotomic Numbers Cyclotomy and Cryptography Cyclotomy and Difference Parameters Cyclotomy and the Differential Cryptanalysis Cryptographic Cyclotomic Numbers Cryptographic Functions from Z p to Z& The Case d = The Case d = The Case d = The Case d = The Case d = The Case d = The Case d = The Case d = Cryptographic Functions from Z pq to Zd Whiteman's Generalized Cyclotomy and Cryptography Cryptographic Functions from Z pg to Zi Cryptographic Functions from Z vq to Z\ Cryptographic Functions from Z p i to Zi Ill 4.6 Cryptographic Functions Defined on GF(p m ) The Origin of Cyclotomic Numbers Special Primes and Sequences Sophie Germain Primes and Sequences Their Importance in Stream Ciphers Their Relations with Other Number-theoretic Problemsl The Existence Problem A Search for Cryptographic Sophie Germain Primes. 124

4 Contents xiii 5.2 Tchebychef Primes and Sequences Their Cryptographic Significance Existence and Search Problem Other Primes of Form fc x 2 n + 1 and Sequences Primes of Form (o n l)/(o 1) and Sequences Mersenne Primes and Sequences Cryptographic Primes of Form ((4u) n - l)/(4w - 1) Prime Repunits and their Cryptographic Values n\ ± 1 and p# ± 1 Primes and Sequences Twin Primes and Sequences over GF(2) The Significance of Twins and their Sexes Cryptographic Twins and the Sex Distribution Twin Primes and Sequences over GF(3) Other Special Primes and Sequences Prime Distributions and their Significance Primes for Stream Ciphers and for RSA Highly Nonlinear Functions Preliminaries Functions with perfect nonlinearity Stability of the set of perfect nonlinear functions under actions of general affine groups Perfect nonlinear functions and difference partitions Functions with perfect nonlinearity and difference matrices A characterization of perfect nonlinearity by means of Fourier transform Obtaining functions with perfect nonlinearity from known ones Bent functions and perfect nonlinearity Binary functions with optimum nonlinearity The case n = 0 (mod 4) The case n = 3 (mod 4) The case n = 2 (mod 4) The case n = 1 (mod 4) and n > Minimum distance from arbne functions Nonbinary functions with optimum nonlinearity The case \B\ = The case B = Constructions of functions with optimum nonlinearity Functions from {GF{q) n,+) to (GF(q),+) 176

5 xiv Contents Functions from (GF(q) n,+) to (GF(q) n,+): perfect and almost perfect nonlinear mappings Functions with optimum nonlinearity from linear functions Other functions from (GF(2 m )*,x) to (GF(2),+) with optimum nonlinearity Functions from ZJ to Z q Difference Sets and Sequences The NSG Realization of Sequences Differential Analysis of Sequences Linear Complexity of DSC (ADSC) Sequences Barker Sequences Binary Cyclotomic Generators Cyclotomic Generator of Order 2k Two-Prime Generator of Order Two-Prime Generator of Order Prime-Square Generator Implementation and Performance A Summary of Binary Cyclotomic Generators Analysis of Cyclotomic Generators of Order Crosscorrelation Property Decimation Property Linear Complexity Security against a Decision Tree Attack Sums of DSC Sequences Linear Complexity Analysis Balance Analysis Correlation Analysis Differential Analysis Nonbinary Cyclotomic Generators The rth-order Cyclotomic Generator Linear Complexity Autocorrelation Property Decimation Property Ideas Behind the Cyclotomic Generators 257

6 Contents xv 11 Generators Based on Permutations The Cryptographic Idea Permutations on Finite Fields Dickson Permutation Polynomials Linearized Permutation Polynomials Permutation Polynomials of the Form x(q+rn-i)/m + ax Permutation Polynomials of the Form x r (g{x 8 ))( q - 1)/s Cohen Permutation Polynomials A Generator Based on Inverse Permutations Binary Generators and Permutations of GF(2 n ) APN Permutations and their Properties Quadratic Permutations with Controllable Nonlinearity Permutations of Order APN Permutations of Order n Permutations of Order n Permutations X d with d = 2 m APN Permutations via Crosscorrelation Function Other Power Functions with Good Nonlinearity Choosing the Linear Functions Cyclic-Key Generators and their Problems Cyclic-Key Generators Several Specific Forms: An Overview A Generator Based on Permutations of Z m Quadratic Partitions and Cryptography Quadratic Partition and Cryptography p = x 2 + y 2 and p = x 2 + 4y p = x 2 + 2y 2 and p = x 2 + 3y p = x 2 + ny 2 and Quadratic Reciprocity p = x 2 + 7y 2 and Quadratic Forms p = x y 2 and Genus Theory p = x 2 + ny 2 and Class Field Theory Other Cryptographic Quadratic Partitions Group Characters and Cryptography Group Characters Field Characters and Cryptography Field Multiplicative Characters: Most Used Ones Field Additive Characters: Most Used Ones Group Characters and Cyclotomic Numbers The Nonlinearity of Characters The Nonlinearity of Multiplicative Characters 333

7 xvi Contents The Nonlinearity of Additive Characters Ring Characters and Cryptography P-Adic Numbers, Class Numbers and Sequences The 2-Adic Value and 2-Adic Expansion A Fast Algorithm for the 2-Adic Expansion The Arithmetic of Q [2 ] and Z [2 ] Feedback Shift Registers with Carry Analysis and Synthesis of FCSRs The 2-Adic Span and 2-RA Algorithm Some Properties of FCSR Sequences Blum-Blum-Shub Sequences & Class Numbers Prime Ciphering Algorithms Prime-32: A Description Theoretical Results about Prime Security Arguments Performance of Prime Prime-32 with a 192-Bit Key Prime Cryptographic Problems and Philosophies Nonlinearity and Linearity Stability and Instability Stability and Diffusion Correlation Stability and Pattern Stability Mutual Information Stability Localness and Globalness Goodness and Badness About Good plus Good About Good plus Bad About Bad plus Good Hardware and Software Model Complexity 404 Appendices 407 A More About Cyclotomic Numbers 407 A.I Cyclotomic Numbers of Order A.2 Cyclotomic Numbers of Orders 9, A.3 Cyclotomic Numbers of Order Eleven 410 A.4 On Other Cyclotomic Numbers 411 A.5 Behind Cyclotomic Numbers 411

8 Contents B Cyclotomic Formulae of Orders 6, 8 and 10 C Finding Practical Primes D List of Research Problems E Exercises F List of Mathematical Symbols Bibliography Index xvu

Cyclic Codes from the Two-Prime Sequences

Cyclic Codes from the Two-Prime Sequences Cunsheng Ding Department of Computer Science and Engineering The Hong Kong University of Science and Technology Kowloon, Hong Kong, CHINA May 2012 Outline of this Talk A brief introduction to cyclic codes

More information

Binary Sequences with Optimal Autocorrelation

Binary Sequences with Optimal Autocorrelation Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA July 2004 The Autocorrelation Function The autocorrelation of a binary sequence {s(t)} of period N at shift w is C s (w) = ( 1) s(t+w) s(t). N 1 t=0 The

More information

Binary Additive Counter Stream Ciphers

Binary Additive Counter Stream Ciphers Number Theory and Related Area ALM 27, pp. 1 23 c Higher Education Press and International Press Beijing Boston Binary Additive Counter Stream Ciphers Cunsheng Ding, Wenpei Si Abstract Although a number

More information

Almost Difference Sets and Their Sequences With Optimal Autocorrelation

Almost Difference Sets and Their Sequences With Optimal Autocorrelation 2934 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 7, NOVEMBER 2001 Almost Difference Sets Their Sequences With Optimal Autocorrelation K. T. Arasu, Cunsheng Ding, Member, IEEE, Tor Helleseth,

More information

GAME PHYSICS ENGINE DEVELOPMENT

GAME PHYSICS ENGINE DEVELOPMENT GAME PHYSICS ENGINE DEVELOPMENT IAN MILLINGTON i > AMSTERDAM BOSTON HEIDELBERG fpf l LONDON. NEW YORK. OXFORD ^. PARIS SAN DIEGO SAN FRANCISCO втс^н Г^ 4.«Mt-fSSKHbe. SINGAPORE. SYDNEY. TOKYO ELSEVIER

More information

Digital Control Engineering Analysis and Design

Digital Control Engineering Analysis and Design Digital Control Engineering Analysis and Design M. Sami Fadali Antonio Visioli AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Academic Press is

More information

STOCHASTIC PROCESSES IN PHYSICS AND CHEMISTRY

STOCHASTIC PROCESSES IN PHYSICS AND CHEMISTRY STOCHASTIC PROCESSES IN PHYSICS AND CHEMISTRY Third edition N.G. VAN KAMPEN Institute for Theoretical Physics of the University at Utrecht ELSEVIER Amsterdam Boston Heidelberg London New York Oxford Paris

More information

Binary Sequences with Optimal Autocorrelation

Binary Sequences with Optimal Autocorrelation Cunsheng DING, HKUST, Kowloon, HONG KONG, CHINA September 2008 Outline of this talk Difference sets and almost difference sets Cyclotomic classes Introduction of binary sequences with optimal autocorrelation

More information

Integrated Arithmetic and Basic Algebra

Integrated Arithmetic and Basic Algebra 211 771 406 III T H I R D E D I T I O N Integrated Arithmetic and Basic Algebra Bill E. Jordan Seminole Community College William P. Palow Miami-Dade College Boston San Francisco New York London Toronto

More information

Cryptography. Number Theory with AN INTRODUCTION TO. James S. Kraft. Lawrence C. Washington. CRC Press

Cryptography. Number Theory with AN INTRODUCTION TO. James S. Kraft. Lawrence C. Washington. CRC Press AN INTRODUCTION TO Number Theory with Cryptography James S Kraft Gilman School Baltimore, Maryland, USA Lawrence C Washington University of Maryland College Park, Maryland, USA CRC Press Taylor & Francis

More information

A Classical Introduction to Modern Number Theory

A Classical Introduction to Modern Number Theory Kenneth Ireland Michael Rosen A Classical Introduction to Modern Number Theory Second Edition Springer Contents Preface to the Second Edition Preface v vii CHAPTER 1 Unique Factorization 1 1 Unique Factorization

More information

System Dynamics for Engineering Students Concepts and Applications

System Dynamics for Engineering Students Concepts and Applications System Dynamics for Engineering Students Concepts and Applications Nicolae Lobontiu University of Alaska Anchorage "Ж AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE

More information

The Hydraulics of Open Channel Flow: An Introduction

The Hydraulics of Open Channel Flow: An Introduction The Hydraulics of Open Channel Flow: An Introduction Basic principles, sediment motion, hydraulic modelling, design of hydraulic structures Second Edition Hubert Chanson Department of Civil Engineering

More information

The Array Structure of Modified Jacobi Sequences

The Array Structure of Modified Jacobi Sequences Journal of Mathematics Research; Vol. 6, No. 1; 2014 ISSN 1916-9795 E-ISSN 1916-9809 Published by Canadian Center of Science and Education The Array Structure of Modified Jacobi Sequences Shenghua Li 1,

More information

Boundary. DIFFERENTIAL EQUATIONS with Fourier Series and. Value Problems APPLIED PARTIAL. Fifth Edition. Richard Haberman PEARSON

Boundary. DIFFERENTIAL EQUATIONS with Fourier Series and. Value Problems APPLIED PARTIAL. Fifth Edition. Richard Haberman PEARSON APPLIED PARTIAL DIFFERENTIAL EQUATIONS with Fourier Series and Boundary Value Problems Fifth Edition Richard Haberman Southern Methodist University PEARSON Boston Columbus Indianapolis New York San Francisco

More information

arxiv: v1 [cs.it] 31 May 2013

arxiv: v1 [cs.it] 31 May 2013 Noname manuscript No. (will be inserted by the editor) A Note on Cyclic Codes from APN Functions Chunming Tang Yanfeng Qi Maozhi Xu arxiv:1305.7294v1 [cs.it] 31 May 2013 Received: date / Accepted: date

More information

College Algebra. Third Edition. Concepts Through Functions. Michael Sullivan. Michael Sullivan, III. Chicago State University. Joliet Junior College

College Algebra. Third Edition. Concepts Through Functions. Michael Sullivan. Michael Sullivan, III. Chicago State University. Joliet Junior College College Algebra Concepts Through Functions Third Edition Michael Sullivan Chicago State University Michael Sullivan, III Joliet Junior College PEARSON Boston Columbus Indianapolis New York San Francisco

More information

ALGEBRAIC SHIFT REGISTER SEQUENCES

ALGEBRAIC SHIFT REGISTER SEQUENCES ALGEBRAIC SHIFT REGISTER SEQUENCES Pseudo-random sequences are essential ingredients of every modern digital communication system including cellular telephones, GPS, secure internet transactions, and satellite

More information

The Differential Cryptanalysis and Design of Natural Stream Ciphers

The Differential Cryptanalysis and Design of Natural Stream Ciphers The Differential Cryptanalysis and Design of Natural Stream Ciphers Cunsheng Ding Buchenring 15B D-76297 Stutensee-Buechig, Germany Abstract. This paper introduces the differential cryptanalysis of additive

More information

APPLIED PARTIAL DIFFERENTIAL EQUATIONS

APPLIED PARTIAL DIFFERENTIAL EQUATIONS APPLIED PARTIAL DIFFERENTIAL EQUATIONS AN I N T R O D U C T I O N ALAN JEFFREY University of Newcastle-upon-Tyne ACADEMIC PRESS An imprint of Elsevier Science Amsterdam Boston London New York Oxford Paris

More information

Generalized hyper-bent functions over GF(p)

Generalized hyper-bent functions over GF(p) Discrete Applied Mathematics 55 2007) 066 070 Note Generalized hyper-bent functions over GFp) A.M. Youssef Concordia Institute for Information Systems Engineering, Concordia University, Montreal, QC, H3G

More information

An Invitation to Modern Number Theory. Steven J. Miller and Ramin Takloo-Bighash PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD

An Invitation to Modern Number Theory. Steven J. Miller and Ramin Takloo-Bighash PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD An Invitation to Modern Number Theory Steven J. Miller and Ramin Takloo-Bighash PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Contents Foreword Preface Notation xi xiii xix PART 1. BASIC NUMBER THEORY

More information

The New Book of Prime Number Records

The New Book of Prime Number Records Paulo Ribenboim The New Book of Prime Number Records Springer Contents Preface Guiding the Reader Index of Notations ix xv xvii Introduction 1 CHARTER 1 How Many Prime Numbers Are There? 3 I. Euclid's

More information

CHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S. Ant nine J aux

CHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S. Ant nine J aux CHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S Ant nine J aux (g) CRC Press Taylor 8* Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor &

More information

Stephen Cohen, University of Glasgow Methods for primitive and normal polynomials

Stephen Cohen, University of Glasgow Methods for primitive and normal polynomials Stephen Cohen, University of Glasgow Methods for primitive and normal polynomials Primitive and normal polynomials over a finite field are, of course, particular examples of irreducible polynomials over

More information

GAME PHYSICS SECOND EDITION. дяййтаййг 1 *

GAME PHYSICS SECOND EDITION. дяййтаййг 1 * GAME PHYSICS SECOND EDITION DAVID H. EBERLY дяййтаййг 1 * К AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO MORGAN ELSEVIER Morgan Kaufmann Publishers

More information

A SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES. Zhaneta Tasheva

A SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES. Zhaneta Tasheva JOURNAL SCIENCE EDUCATION INNOVATION, VOL. 2. 2014 Association Scientific and Applied Research International Journal Original Contribution ISSN 1314-9784 A SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES

More information

DIFFERENTIAL EQUATIONS, DYNAMICAL SYSTEMS, AND AN INTRODUCTION TO CHAOS

DIFFERENTIAL EQUATIONS, DYNAMICAL SYSTEMS, AND AN INTRODUCTION TO CHAOS DIFFERENTIAL EQUATIONS, DYNAMICAL SYSTEMS, AND AN INTRODUCTION TO CHAOS Morris W. Hirsch University of California, Berkeley Stephen Smale University of California, Berkeley Robert L. Devaney Boston University

More information

Differential Equations with Mathematica

Differential Equations with Mathematica Differential Equations with Mathematica THIRD EDITION Martha L. Abell James P. Braselton ELSEVIER ACADEMIC PRESS Amsterdam Boston Heidelberg London New York Oxford Paris San Diego San Francisco Singapore

More information

NON-LINEAR COMPLEXITY OF THE NAOR REINGOLD PSEUDO-RANDOM FUNCTION

NON-LINEAR COMPLEXITY OF THE NAOR REINGOLD PSEUDO-RANDOM FUNCTION NON-LINEAR COMPLEXITY OF THE NAOR REINGOLD PSEUDO-RANDOM FUNCTION William D. Banks 1, Frances Griffin 2, Daniel Lieman 3, Igor E. Shparlinski 4 1 Department of Mathematics, University of Missouri Columbia,

More information

Thesis Research Notes

Thesis Research Notes Thesis Research Notes Week 26-2012 Christopher Wood June 29, 2012 Abstract This week was devoted to reviewing some classical literature on the subject of Boolean functions and their application to cryptography.

More information

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x]. The second exam will be on Friday, October 28, 2. It will cover Sections.7,.8, 3., 3.2, 3.4 (except 3.4.), 4. and 4.2 plus the handout on calculation of high powers of an integer modulo n via successive

More information

Statistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study

Statistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study International Journal of Foundations of Computer Science c World Scientific Publishing Company Statistical Properties of the Arithmetic Correlation of Sequences Mark Goresky School of Mathematics Institute

More information

Periodicity and Distribution Properties of Combined FCSR Sequences

Periodicity and Distribution Properties of Combined FCSR Sequences Periodicity and Distribution Properties of Combined FCSR Sequences Mark Goresky 1, and Andrew Klapper, 1 Institute for Advanced Study, Princeton NJ www.math.ias.edu/~goresky Dept. of Computer Science,

More information

Functions on Finite Fields, Boolean Functions, and S-Boxes

Functions on Finite Fields, Boolean Functions, and S-Boxes Functions on Finite Fields, Boolean Functions, and S-Boxes Claude Shannon Institute www.shannoninstitute.ie and School of Mathematical Sciences University College Dublin Ireland 1 July, 2013 Boolean Function

More information

Fast correlation attacks on certain stream ciphers

Fast correlation attacks on certain stream ciphers FSE 2011, February 14-16, Lyngby, Denmark Fast correlation attacks on certain stream ciphers Willi Meier FHNW Switzerland 1 Overview A decoding problem LFSR-based stream ciphers Correlation attacks Fast

More information

Some Results on the Arithmetic Correlation of Sequences

Some Results on the Arithmetic Correlation of Sequences Some Results on the Arithmetic Correlation of Sequences Mark Goresky Andrew Klapper Abstract In this paper we study various properties of arithmetic correlations of sequences. Arithmetic correlations are

More information

Sequences, DFT and Resistance against Fast Algebraic Attacks

Sequences, DFT and Resistance against Fast Algebraic Attacks Sequences, DFT and Resistance against Fast Algebraic Attacks Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo, Ontario N2L 3G1, CANADA Email. ggong@calliope.uwaterloo.ca

More information

Chapter 4 Mathematics of Cryptography

Chapter 4 Mathematics of Cryptography Chapter 4 Mathematics of Cryptography Part II: Algebraic Structures Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 4.1 Chapter 4 Objectives To review the concept

More information

GEOPHYSICAL INVERSE THEORY AND REGULARIZATION PROBLEMS

GEOPHYSICAL INVERSE THEORY AND REGULARIZATION PROBLEMS Methods in Geochemistry and Geophysics, 36 GEOPHYSICAL INVERSE THEORY AND REGULARIZATION PROBLEMS Michael S. ZHDANOV University of Utah Salt Lake City UTAH, U.S.A. 2OO2 ELSEVIER Amsterdam - Boston - London

More information

Codes and Cryptography. Jorge L. Villar. MAMME, Fall 2015 PART XII

Codes and Cryptography. Jorge L. Villar. MAMME, Fall 2015 PART XII Codes and Cryptography MAMME, Fall 2015 PART XII Outline 1 Symmetric Encryption (II) 2 Construction Strategies Construction Strategies Stream ciphers: For arbitrarily long messages (e.g., data streams).

More information

Fundamentals of Applied Probability and Random Processes

Fundamentals of Applied Probability and Random Processes Fundamentals of Applied Probability and Random Processes,nd 2 na Edition Oliver C. Ibe University of Massachusetts, LoweLL, Massachusetts ip^ W >!^ AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS

More information

Constructing a Ternary FCSR with a Given Connection Integer

Constructing a Ternary FCSR with a Given Connection Integer Constructing a Ternary FCSR with a Given Connection Integer Lin Zhiqiang 1,2 and Pei Dingyi 1,2 1 School of Mathematics and Information Sciences, Guangzhou University, China 2 State Key Laboratory of Information

More information

STREAM CIPHER. Chapter - 3

STREAM CIPHER. Chapter - 3 STREAM CIPHER Chapter - 3 S t r e a m C i p h e r P a g e 38 S t r e a m C i p h e r P a g e 39 STREAM CIPHERS Stream cipher is a class of symmetric key algorithm that operates on individual bits or bytes.

More information

Lecture Notes. Advanced Discrete Structures COT S

Lecture Notes. Advanced Discrete Structures COT S Lecture Notes Advanced Discrete Structures COT 4115.001 S15 2015-01-27 Recap ADFGX Cipher Block Cipher Modes of Operation Hill Cipher Inverting a Matrix (mod n) Encryption: Hill Cipher Example Multiple

More information

Some approaches to construct MDS matrices over a finite field

Some approaches to construct MDS matrices over a finite field 2017 6 Å 31 Å 2 ¹ June 2017 Communication on Applied Mathematics and Computation Vol.31 No.2 DOI 10.3969/j.issn.1006-6330.2017.02.001 Some approaches to construct MDS matrices over a finite field BELOV

More information

Trace Representation of Legendre Sequences

Trace Representation of Legendre Sequences C Designs, Codes and Cryptography, 24, 343 348, 2001 2001 Kluwer Academic Publishers. Manufactured in The Netherlands. Trace Representation of Legendre Sequences JEONG-HEON KIM School of Electrical and

More information

Self-shrinking Bit Generation Algorithm Based on Feedback with Carry Shift Register

Self-shrinking Bit Generation Algorithm Based on Feedback with Carry Shift Register Advanced Studies in Theoretical Physics Vol. 8, 2014, no. 24, 1057-1061 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/astp.2014.49132 Self-shrinking Bit Generation Algorithm Based on Feedback

More information

DIFFERENTIAL EQUATIONS, DYNAMICAL SYSTEMS, AND AN INTRODUCTION TO CHAOS

DIFFERENTIAL EQUATIONS, DYNAMICAL SYSTEMS, AND AN INTRODUCTION TO CHAOS DIFFERENTIAL EQUATIONS, DYNAMICAL SYSTEMS, AND AN INTRODUCTION TO CHAOS Morris W. Hirsch University of California, Berkeley Stephen Smale University of California, Berkeley Robert L. Devaney Boston University

More information

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Muxiang Zhang 1 and Agnes Chan 2 1 GTE Laboratories Inc., 40 Sylvan Road LA0MS59, Waltham, MA 02451 mzhang@gte.com 2 College of Computer

More information

Other Public-Key Cryptosystems

Other Public-Key Cryptosystems Other Public-Key Cryptosystems Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-11/

More information

Introduction to Economic Geography

Introduction to Economic Geography Introduction to Economic Geography Globalization, Uneven Development and Place 2nd edition Danny MacKinnon and Andrew Cumbers Harlow, England London New York Boston San Francisco Toronto Sydney Singapore

More information

Exploring Monte Carlo Methods

Exploring Monte Carlo Methods Exploring Monte Carlo Methods William L Dunn J. Kenneth Shultis AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO ELSEVIER Academic Press Is an imprint

More information

Environmental Hydraulics of Open Channel Flows

Environmental Hydraulics of Open Channel Flows Environmental Hydraulics of Open Channel Flows Hubert Chanson ME, ENSHM Grenoble, INSTN, PhD (Cant), DEng (Qld) Eur Ing, MIEAust, MIAHR 13th Arthur Ippen awardee (IAHR) Reader in Environmental Fluid Mechanics

More information

Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1

Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1 Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1 Kwangsu Lee A Thesis for the Degree of Master of Science Division of Computer Science, Department

More information

Modified Alternating Step Generators

Modified Alternating Step Generators Modified Alternating Step Generators Robert Wicik, Tomasz Rachwalik Military Communication Institute Warszawska 22A, 05-130 Zegrze, Poland {r.wicik, t.rachwalik}@wil.waw.pl Abstract. Irregular clocking

More information

Essentials of College Algebra

Essentials of College Algebra Essentials of College Algebra For these Global Editions, the editorial team at Pearson has collaborated with educators across the world to address a wide range of subjects and requirements, equipping students

More information

Classical Cryptography

Classical Cryptography Classical Cryptography CSG 252 Fall 2006 Riccardo Pucella Goals of Cryptography Alice wants to send message X to Bob Oscar is on the wire, listening to communications Alice and Bob share a key K Alice

More information

An Introduction to Stochastic Modeling

An Introduction to Stochastic Modeling F An Introduction to Stochastic Modeling Fourth Edition Mark A. Pinsky Department of Mathematics Northwestern University Evanston, Illinois Samuel Karlin Department of Mathematics Stanford University Stanford,

More information

Fundamentals of Nuclear Reactor Physics

Fundamentals of Nuclear Reactor Physics Fundamentals of Nuclear Reactor Physics E. E. Lewis Professor of Mechanical Engineering McCormick School of Engineering and Applied Science Northwestern University AMSTERDAM BOSTON HEIDELBERG LONDON NEW

More information

ALGEBRA AND ALGEBRAIC COMPUTING ELEMENTS OF. John D. Lipson. Addison-Wesley Publishing Company, Inc.

ALGEBRA AND ALGEBRAIC COMPUTING ELEMENTS OF. John D. Lipson. Addison-Wesley Publishing Company, Inc. ELEMENTS OF ALGEBRA AND ALGEBRAIC COMPUTING John D. Lipson University of Toronto PRO Addison-Wesley Publishing Company, Inc. Redwood City, California Menlo Park, California Reading, Massachusetts Amsterdam

More information

Feature Extraction and Image Processing

Feature Extraction and Image Processing Feature Extraction and Image Processing Second edition Mark S. Nixon Alberto S. Aguado :*авш JBK IIP AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO

More information

Pseudorandom Generators

Pseudorandom Generators Outlines Saint Petersburg State University, Mathematics and Mechanics 2nd April 2005 Outlines Part I: Main Approach Part II: Blum-Blum-Shub Generator Part III: General Concepts of Pseudorandom Generator

More information

Finite Fields. SOLUTIONS Network Coding - Prof. Frank H.P. Fitzek

Finite Fields. SOLUTIONS Network Coding - Prof. Frank H.P. Fitzek Finite Fields In practice most finite field applications e.g. cryptography and error correcting codes utilizes a specific type of finite fields, namely the binary extension fields. The following exercises

More information

B. Encryption using quasigroup

B. Encryption using quasigroup Sequence Randomization Using Quasigroups and Number Theoretic s Vaignana Spoorthy Ella Department of Computer Science Oklahoma State University Stillwater, Oklahoma, USA spoorthyella@okstateedu Abstract

More information

Quasi-reducible Polynomials

Quasi-reducible Polynomials Quasi-reducible Polynomials Jacques Willekens 06-Dec-2008 Abstract In this article, we investigate polynomials that are irreducible over Q, but are reducible modulo any prime number. 1 Introduction Let

More information

RELATION ALGEBRAS. Roger D. MADDUX. Department of Mathematics Iowa State University Ames, Iowa USA ELSEVIER

RELATION ALGEBRAS. Roger D. MADDUX. Department of Mathematics Iowa State University Ames, Iowa USA ELSEVIER RELATION ALGEBRAS Roger D. MADDUX Department of Mathematics Iowa State University Ames, Iowa 50011 USA ELSEVIER AMSTERDAM. BOSTON HEIDELBERG LONDON NEW YORK. OXFORD PARIS SAN DIEGO. SAN FRANCISCO. SINGAPORE.

More information

EXPONENTIAL SUMS EQUIDISTRIBUTION

EXPONENTIAL SUMS EQUIDISTRIBUTION EXPONENTIAL SUMS EQUIDISTRIBUTION PSEUDORANDOMNESS (1) Exponential sums over subgroups General philosophy: multiplicative subgroups are well-distributed even if they are very small Conjecture. (M-V-W)

More information

Secret-sharing with a class of ternary codes

Secret-sharing with a class of ternary codes Theoretical Computer Science 246 (2000) 285 298 www.elsevier.com/locate/tcs Note Secret-sharing with a class of ternary codes Cunsheng Ding a, David R Kohel b, San Ling c; a Department of Computer Science,

More information

Breaking the F-FCSR-H Stream Cipher in Real Time

Breaking the F-FCSR-H Stream Cipher in Real Time Breaking the F-FCSR-H Stream Cipher in Real Time Martin Hell and Thomas Johansson Dept. of Electrical and Information Technology, Lund University, P.O. Box 118, 221 00 Lund, Sweden Abstract. The F-FCSR

More information

Analysis of Some Quasigroup Transformations as Boolean Functions

Analysis of Some Quasigroup Transformations as Boolean Functions M a t h e m a t i c a B a l k a n i c a New Series Vol. 26, 202, Fasc. 3 4 Analysis of Some Quasigroup Transformations as Boolean Functions Aleksandra Mileva Presented at MASSEE International Conference

More information

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment. CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES A selection of the following questions will be chosen by the lecturer to form the Cryptology Assignment. The Cryptology Assignment is due by 5pm Sunday 1

More information

Towards non-linear feedbacks

Towards non-linear feedbacks Towards non-linear feedbacks Who? Cédric Lauradoux When? December 2, 2008 Applications of sequences BPSK Data Carrier m t IV Init s n K k t f Φ Φ c t s 1 s n s 1 PRNG Spread spectrum Boolean functions

More information

Feedback with Carry Shift Registers over Finite Fields (Extended Abstract)

Feedback with Carry Shift Registers over Finite Fields (Extended Abstract) Feedback with Carry Shift Registers over Finite Fields (Extended Abstract) Andrew Klapper* Dept. of Computer Science 763H Anderson Hall University of Kentucky, Lexington KY 40506-0046 USA klapper@cs.uky.edu.

More information

Correcting Codes in Cryptography

Correcting Codes in Cryptography EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.

More information

Affine equivalence in the AES round function

Affine equivalence in the AES round function Discrete Applied Mathematics 148 (2005) 161 170 www.elsevier.com/locate/dam Affine equivalence in the AES round function A.M. Youssef a, S.E. Tavares b a Concordia Institute for Information Systems Engineering,

More information

Quantum Mechanics: Foundations and Applications

Quantum Mechanics: Foundations and Applications Arno Böhm Quantum Mechanics: Foundations and Applications Third Edition, Revised and Enlarged Prepared with Mark Loewe With 96 Illustrations Springer-Verlag New York Berlin Heidelberg London Paris Tokyo

More information

A Polynomial Description of the Rijndael Advanced Encryption Standard

A Polynomial Description of the Rijndael Advanced Encryption Standard A Polynomial Description of the Rijndael Advanced Encryption Standard arxiv:cs/0205002v1 [cs.cr] 2 May 2002 Joachim Rosenthal Department of Mathematics University of Notre Dame Notre Dame, Indiana 46556,

More information

Private-key Systems. Block ciphers. Stream ciphers

Private-key Systems. Block ciphers. Stream ciphers Chapter 2 Stream Ciphers Further Reading: [Sim92, Chapter 2] 21 Introduction Remember classication: Private-key Systems Block ciphers Stream ciphers Figure 21: Private-key cipher classication Block Cipher:

More information

50 Years of Crosscorrelation of m-sequences

50 Years of Crosscorrelation of m-sequences 50 Years of Crosscorrelation of m-sequences Tor Helleseth Selmer Center Department of Informatics University of Bergen Bergen, Norway August 29, 2017 Tor Helleseth (Selmer Center) 50 Years of Crosscorrelation

More information

Binary Cyclotomic Generators

Binary Cyclotomic Generators Binary Cyclotomic Generators Cunsheng Ding* Department of Mathematics University of Turku Fin-20500 Turku, Finland cding@ra.abo.fi Abstract. In this paper a number of binary cyclotomic generators based

More information

c 2013 Society for Industrial and Applied Mathematics

c 2013 Society for Industrial and Applied Mathematics SIAM J. DISCRETE MATH. Vol. 27, No. 4, pp. 1977 1994 c 2013 Society for Industrial and Applied Mathematics CYCLIC CODES FROM SOME MONOMIALS AND TRINOMIALS CUNSHENG DING Abstract. Cyclic codes are a subclass

More information

Stream Ciphers: Cryptanalytic Techniques

Stream Ciphers: Cryptanalytic Techniques Stream Ciphers: Cryptanalytic Techniques Thomas Johansson Department of Electrical and Information Technology. Lund University, Sweden ECRYPT Summer school 2007 (Lund University) Stream Ciphers: Cryptanalytic

More information

Design of Pseudo-Random Spreading Sequences for CDMA Systems

Design of Pseudo-Random Spreading Sequences for CDMA Systems Design of Pseudo-Random Spreading Sequences for CDMA Systems Jian Ren and Tongtong Li Department of Electrical and Computer Engineering Michigan State University, 2120 Engineering Building East Lansing,

More information

A New Characterization of Semi-bent and Bent Functions on Finite Fields

A New Characterization of Semi-bent and Bent Functions on Finite Fields A New Characterization of Semi-bent and Bent Functions on Finite Fields Khoongming Khoo DSO National Laboratories 20 Science Park Dr S118230, Singapore email: kkhoongm@dso.org.sg Guang Gong Department

More information

Topic 3. Design of Sequences with Low Correlation

Topic 3. Design of Sequences with Low Correlation Topic 3. Design of Sequences with Low Correlation M-sequences and Quadratic Residue Sequences 2 Multiple Trace Term Sequences and WG Sequences 3 Gold-pair, Kasami Sequences, and Interleaved Sequences 4

More information

On the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ ΕΚΘΕΣΗ 2010

On the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ ΕΚΘΕΣΗ 2010 Introduction Boolean functions 2nd order nonlinearity Summary ARXH PROSTASIAS_APOLOGISMOS 2010.indd 1 20/04/2011 12:54 ΜΜ On the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ

More information

3.8 MEASURE OF RUNDOMNESS:

3.8 MEASURE OF RUNDOMNESS: Lec 10 : Data Security Stream Cipher Systems 1 3.8 MEASURE OF RUNDOMNESS: 3.9.1 DEFINITION: Run: sequence of identical bits (0 or 1) Ex.01110000111 Runs are 0,111, 0000, 111 Gap: runs of zeroes 1000011

More information

SPHERICAL NEAR-FIELD ANTENNA MEASUREMENTS

SPHERICAL NEAR-FIELD ANTENNA MEASUREMENTS SPHERICAL NEAR-FIELD ANTENNA MEASUREMENTS Edited by J.E.Hansen Peter Peregrinus Ltd. on behalf of the Institution of Electrical Engineers Contents Contributing authors listed Preface v xiii 1 Introduction

More information

DISCRETE-TIME SIGNAL PROCESSING

DISCRETE-TIME SIGNAL PROCESSING THIRD EDITION DISCRETE-TIME SIGNAL PROCESSING ALAN V. OPPENHEIM MASSACHUSETTS INSTITUTE OF TECHNOLOGY RONALD W. SCHÄFER HEWLETT-PACKARD LABORATORIES Upper Saddle River Boston Columbus San Francisco New

More information

Stream ciphers I. Thomas Johansson. May 16, Dept. of EIT, Lund University, P.O. Box 118, Lund, Sweden

Stream ciphers I. Thomas Johansson. May 16, Dept. of EIT, Lund University, P.O. Box 118, Lund, Sweden Dept. of EIT, Lund University, P.O. Box 118, 221 00 Lund, Sweden thomas@eit.lth.se May 16, 2011 Outline: Introduction to stream ciphers Distinguishers Basic constructions of distinguishers Various types

More information

Pseudo-random Number Generation. Qiuliang Tang

Pseudo-random Number Generation. Qiuliang Tang Pseudo-random Number Generation Qiuliang Tang Random Numbers in Cryptography The keystream in the one-time pad The secret key in the DES encryption The prime numbers p, q in the RSA encryption The private

More information

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,

More information

Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach

Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach M A Hasan 1 and C Negre 2 1 ECE Department and CACR, University of Waterloo, Ontario, Canada 2 Team

More information

Transform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and

Transform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and Transform Domain Analysis of DES Guang Gong and Solomon W. Golomb Communication Sciences Institute University of Southern California Electrical Engineering-Systems, EEB # 500 Los Angeles, California 90089-2565

More information

Numerical Methods with MATLAB

Numerical Methods with MATLAB Numerical Methods with MATLAB A Resource for Scientists and Engineers G. J. BÖRSE Lehigh University PWS Publishing Company I(T)P AN!NTERNATIONAL THOMSON PUBLISHING COMPANY Boston Albany Bonn Cincinnati

More information

Outline. 1 Arithmetic on Bytes and 4-Byte Vectors. 2 The Rijndael Algorithm. 3 AES Key Schedule and Decryption. 4 Strengths and Weaknesses of Rijndael

Outline. 1 Arithmetic on Bytes and 4-Byte Vectors. 2 The Rijndael Algorithm. 3 AES Key Schedule and Decryption. 4 Strengths and Weaknesses of Rijndael Outline CPSC 418/MATH 318 Introduction to Cryptography Advanced Encryption Standard Renate Scheidler Department of Mathematics & Statistics Department of Computer Science University of Calgary Based in

More information

Energy Optimization in Process Systems. Warsaw University of TechnoLogy, Facuity of Chemical and Process Engineering, Warsaw, Poland ELSEVIER

Energy Optimization in Process Systems. Warsaw University of TechnoLogy, Facuity of Chemical and Process Engineering, Warsaw, Poland ELSEVIER Energy Optimization in Process Systems First Edition Stanistaw Sieniutycz Warsaw University of TechnoLogy, Facuity of Chemical and Process Engineering, Warsaw, Poland Jacek Jekowski Rzeszöw University

More information

Singer and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few

Singer and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few New Families of Ideal -level Autocorrelation Ternary Sequences From Second Order DHT Michael Ludkovski 1 and Guang Gong Department of Electrical and Computer Engineering University of Waterloo Waterloo,

More information

Hands-on Matrix Algebra Using R

Hands-on Matrix Algebra Using R Preface vii 1. R Preliminaries 1 1.1 Matrix Defined, Deeper Understanding Using Software.. 1 1.2 Introduction, Why R?.................... 2 1.3 Obtaining R.......................... 4 1.4 Reference Manuals

More information