Stream Ciphers and Number Theory

Similar documents
Cyclic Codes from the Two-Prime Sequences

Binary Sequences with Optimal Autocorrelation

Binary Additive Counter Stream Ciphers

Almost Difference Sets and Their Sequences With Optimal Autocorrelation

GAME PHYSICS ENGINE DEVELOPMENT

Digital Control Engineering Analysis and Design

STOCHASTIC PROCESSES IN PHYSICS AND CHEMISTRY

Binary Sequences with Optimal Autocorrelation

Integrated Arithmetic and Basic Algebra

Cryptography. Number Theory with AN INTRODUCTION TO. James S. Kraft. Lawrence C. Washington. CRC Press

A Classical Introduction to Modern Number Theory

System Dynamics for Engineering Students Concepts and Applications

The Hydraulics of Open Channel Flow: An Introduction

The Array Structure of Modified Jacobi Sequences

Boundary. DIFFERENTIAL EQUATIONS with Fourier Series and. Value Problems APPLIED PARTIAL. Fifth Edition. Richard Haberman PEARSON

arxiv: v1 [cs.it] 31 May 2013

College Algebra. Third Edition. Concepts Through Functions. Michael Sullivan. Michael Sullivan, III. Chicago State University. Joliet Junior College

ALGEBRAIC SHIFT REGISTER SEQUENCES

The Differential Cryptanalysis and Design of Natural Stream Ciphers

APPLIED PARTIAL DIFFERENTIAL EQUATIONS

Generalized hyper-bent functions over GF(p)

An Invitation to Modern Number Theory. Steven J. Miller and Ramin Takloo-Bighash PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD

The New Book of Prime Number Records

CHAPMAN & HALL/CRC CRYPTOGRAPHY AND NETWORK SECURITY ALGORITHMIC CR YPTAN ALY51S. Ant nine J aux

Stephen Cohen, University of Glasgow Methods for primitive and normal polynomials

GAME PHYSICS SECOND EDITION. дяййтаййг 1 *

A SHORT SURVEY OF P-ARY PSEUDO-RANDOM SEQUENCES. Zhaneta Tasheva

DIFFERENTIAL EQUATIONS, DYNAMICAL SYSTEMS, AND AN INTRODUCTION TO CHAOS

Differential Equations with Mathematica

NON-LINEAR COMPLEXITY OF THE NAOR REINGOLD PSEUDO-RANDOM FUNCTION

Thesis Research Notes

Know the meaning of the basic concepts: ring, field, characteristic of a ring, the ring of polynomials R[x].

Statistical Properties of the Arithmetic Correlation of Sequences. Mark Goresky School of Mathematics Institute for Advanced Study

Periodicity and Distribution Properties of Combined FCSR Sequences

Functions on Finite Fields, Boolean Functions, and S-Boxes

Fast correlation attacks on certain stream ciphers

Some Results on the Arithmetic Correlation of Sequences

Sequences, DFT and Resistance against Fast Algebraic Attacks

Chapter 4 Mathematics of Cryptography

GEOPHYSICAL INVERSE THEORY AND REGULARIZATION PROBLEMS

Codes and Cryptography. Jorge L. Villar. MAMME, Fall 2015 PART XII

Fundamentals of Applied Probability and Random Processes

Constructing a Ternary FCSR with a Given Connection Integer

STREAM CIPHER. Chapter - 3

Lecture Notes. Advanced Discrete Structures COT S

Some approaches to construct MDS matrices over a finite field

Trace Representation of Legendre Sequences

Self-shrinking Bit Generation Algorithm Based on Feedback with Carry Shift Register

DIFFERENTIAL EQUATIONS, DYNAMICAL SYSTEMS, AND AN INTRODUCTION TO CHAOS

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers

Other Public-Key Cryptosystems

Introduction to Economic Geography

Exploring Monte Carlo Methods

Environmental Hydraulics of Open Channel Flows

Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1

Modified Alternating Step Generators

Essentials of College Algebra

Classical Cryptography

An Introduction to Stochastic Modeling

Fundamentals of Nuclear Reactor Physics

ALGEBRA AND ALGEBRAIC COMPUTING ELEMENTS OF. John D. Lipson. Addison-Wesley Publishing Company, Inc.

Feature Extraction and Image Processing

Pseudorandom Generators

Finite Fields. SOLUTIONS Network Coding - Prof. Frank H.P. Fitzek

B. Encryption using quasigroup

Quasi-reducible Polynomials

RELATION ALGEBRAS. Roger D. MADDUX. Department of Mathematics Iowa State University Ames, Iowa USA ELSEVIER

EXPONENTIAL SUMS EQUIDISTRIBUTION

Secret-sharing with a class of ternary codes

Breaking the F-FCSR-H Stream Cipher in Real Time

Analysis of Some Quasigroup Transformations as Boolean Functions

CODING AND CRYPTOLOGY III CRYPTOLOGY EXERCISES. The questions with a * are extension questions, and will not be included in the assignment.

Towards non-linear feedbacks

Feedback with Carry Shift Registers over Finite Fields (Extended Abstract)

Correcting Codes in Cryptography

Affine equivalence in the AES round function

Quantum Mechanics: Foundations and Applications

A Polynomial Description of the Rijndael Advanced Encryption Standard

Private-key Systems. Block ciphers. Stream ciphers

50 Years of Crosscorrelation of m-sequences

Binary Cyclotomic Generators

c 2013 Society for Industrial and Applied Mathematics

Stream Ciphers: Cryptanalytic Techniques

Design of Pseudo-Random Spreading Sequences for CDMA Systems

A New Characterization of Semi-bent and Bent Functions on Finite Fields

Topic 3. Design of Sequences with Low Correlation

On the computation of best second order approximations of Boolean Functions ΕΤΗΣΙΑ ΕΚΘΕΣΗ 2010

3.8 MEASURE OF RUNDOMNESS:

SPHERICAL NEAR-FIELD ANTENNA MEASUREMENTS

DISCRETE-TIME SIGNAL PROCESSING

Stream ciphers I. Thomas Johansson. May 16, Dept. of EIT, Lund University, P.O. Box 118, Lund, Sweden

Pseudo-random Number Generation. Qiuliang Tang

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated

Subquadratic space complexity multiplier for a class of binary fields using Toeplitz matrix approach

Transform Domain Analysis of DES. Guang Gong and Solomon W. Golomb. University of Southern California. Tels and

Numerical Methods with MATLAB

Outline. 1 Arithmetic on Bytes and 4-Byte Vectors. 2 The Rijndael Algorithm. 3 AES Key Schedule and Decryption. 4 Strengths and Weaknesses of Rijndael

Energy Optimization in Process Systems. Warsaw University of TechnoLogy, Facuity of Chemical and Process Engineering, Warsaw, Poland ELSEVIER

Singer and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few

Hands-on Matrix Algebra Using R

Transcription:

Stream Ciphers and Number Theory Revised Edition Thomas W. Cusick The State University of New York at Buffalo, NY, U.S.A. Cunsheng Ding The Hong Kong University of Science and Technology China Ari Renvall The University of Turku Finland ELSEVIER 2004 Amsterdam - Boston - Heidelberg - London - New York - Oxford Paris - San Diego -San Francisco - Singapore - Sydney - Tokyo

Contents Preface to the Revised Edition Preface to the First Edition vii ix 1 Introduction 1 1.1 Applications of Number Theory 2 1.2 An Outline of this Book 5 2 Stream Ciphers 11 2.1 Stream Cipher Systems 11 2.1.1 Additive Synchronous Stream Ciphers 13 2.1.2 Additive Self-Synchronous Stream Ciphers 14 2.1.3 Nonadditive Synchronous Stream Ciphers 14 2.1.4 Stream Ciphering with Block Ciphers 16 2.1.5 Cooperatively Distributed Ciphering 18 2.2 Some Keystream Generators 21 2.2.1 Generators Based on Counters 22 2.2.2 Some Number-Theoretic Generators 24 2.3 Cryptographic Aspects of Sequences 25 2.3.1 Minimal Polynomial and Linear Complexity 25 2.3.2 Pattern Distribution of Key Streams 29 2.3.3 Correlation Functions 31 2.3.4 Sphere Complexity and Linear Cryptanalysis 33 2.3.5 Higher Order Complexities 36 2.4 Harmony of Binary NSGs 37 2.5 Security and Attacks 41 3 Primes, Primitive Roots and Sequences 45 3.1 Cyclotomic Polynomials 45 3.2 Two Basic Problems from Stream Ciphers 47 XI

xii Contents 3.3 A Basic Theorem and Main Bridge 50 3.4 Primes, Primitive Roots and Binary Sequences 53 3.5 Primes, Primitive Roots and Ternary Sequences 58 3.6 Primes, Negord and Sequences 61 3.7 Prime Powers, Primitive Roots and Sequences 63 3.8 Prime Products and Sequences 65 3.8.1 Binary Sequences and Primes 66 3.8.2 Ternary Sequences and Primes 67 3.9 On Cryptographic Primitive Roots 68 3.10 Linear Complexity of Sequences over Z m 70 3.11 Period and its Cryptographic Importance 79 3.12 Recent Advances on the Sphere Complexity 80 4 Cyclotomy and Cryptographic Functions 83 4.1 Cyclotomic Numbers 83 4.2 Cyclotomy and Cryptography 85 4.2.1 Cyclotomy and Difference Parameters 86 4.2.2 Cyclotomy and the Differential Cryptanalysis 87 4.2.3 Cryptographic Cyclotomic Numbers 88 4.3 Cryptographic Functions from Z p to Z& 89 4.3.1 The Case d = 2 91 4.3.2 The Case d = 3 92 4.3.3 The Case d = 4 93 4.3.4 The Case d = 5 94 4.3.5 The Case d = 6 96 4.3.6 The Case d = 8 96 4.3.7 The Case d = 10 99 4.3.8 The Case d = 12 100 4.4 Cryptographic Functions from Z pq to Zd 101 4.4.1 Whiteman's Generalized Cyclotomy and Cryptography 101 4.4.2 Cryptographic Functions from Z pg to Zi 107 4.4.3 Cryptographic Functions from Z vq to Z\ 110 4.5 Cryptographic Functions from Z p i to Zi Ill 4.6 Cryptographic Functions Defined on GF(p m ) 115 4.7 The Origin of Cyclotomic Numbers 115 5 Special Primes and Sequences 121 5.1 Sophie Germain Primes and Sequences 121 5.1.1 Their Importance in Stream Ciphers 122 5.1.2 Their Relations with Other Number-theoretic Problemsl23 5.1.3 The Existence Problem 124 5.1.4 A Search for Cryptographic Sophie Germain Primes. 124

Contents xiii 5.2 Tchebychef Primes and Sequences 126 5.2.1 Their Cryptographic Significance 126 5.2.2 Existence and Search Problem 126 5.3 Other Primes of Form fc x 2 n + 1 and Sequences 127 5.4 Primes of Form (o n l)/(o 1) and Sequences 131 5.4.1 Mersenne Primes and Sequences 132 5.4.2 Cryptographic Primes of Form ((4u) n - l)/(4w - 1). 134 5.4.3 Prime Repunits and their Cryptographic Values... 135 5.5 n\ ± 1 and p# ± 1 Primes and Sequences 136 5.6 Twin Primes and Sequences over GF(2) 138 5.6.1 The Significance of Twins and their Sexes 138 5.6.2 Cryptographic Twins and the Sex Distribution... 140 5.7 Twin Primes and Sequences over GF(3) 142 5.8 Other Special Primes and Sequences 143 5.9 Prime Distributions and their Significance 143 5.10 Primes for Stream Ciphers and for RSA 144 6 Highly Nonlinear Functions 147 6.1 Preliminaries 148 6.2 Functions with perfect nonlinearity 149 6.2.1 Stability of the set of perfect nonlinear functions under actions of general affine groups 150 6.2.2 Perfect nonlinear functions and difference partitions. 151 6.2.3 Functions with perfect nonlinearity and difference matrices 155 6.2.4 A characterization of perfect nonlinearity by means of Fourier transform 156 6.2.5 Obtaining functions with perfect nonlinearity from known ones 159 6.2.6 Bent functions and perfect nonlinearity 161 6.3 Binary functions with optimum nonlinearity 162 6.3.1 The case n = 0 (mod 4) 163 6.3.2 The case n = 3 (mod 4) 165 6.3.3 The case n = 2 (mod 4) 166 6.3.4 The case n = 1 (mod 4) and n > 1 170 6.3.5 Minimum distance from arbne functions 172 6.4 Nonbinary functions with optimum nonlinearity 173 6.4.1 The case \B\ = 3 173 6.4.2 The case B =4 174 6.5 Constructions of functions with optimum nonlinearity... 176 6.5.1 Functions from {GF{q) n,+) to (GF(q),+) 176

xiv Contents 6.5.2 Functions from (GF(q) n,+) to (GF(q) n,+): perfect and almost perfect nonlinear mappings 179 6.5.3 Functions with optimum nonlinearity from linear functions 181 6.5.4 Other functions from (GF(2 m )*,x) to (GF(2),+) with optimum nonlinearity 181 6.5.5 Functions from ZJ to Z q 183 7 Difference Sets and Sequences 185 7.1 The NSG Realization of Sequences 185 7.2 Differential Analysis of Sequences 187 7.3 Linear Complexity of DSC (ADSC) Sequences 189 7.4 Barker Sequences 192 8 Binary Cyclotomic Generators 195 8.1 Cyclotomic Generator of Order 2k 195 8.2 Two-Prime Generator of Order 2 198 8.3 Two-Prime Generator of Order 4 212 8.4 Prime-Square Generator 213 8.5 Implementation and Performance 225 8.6 A Summary of Binary Cyclotomic Generators 225 9 Analysis of Cyclotomic Generators of Order 2 227 9.1 Crosscorrelation Property 228 9.2 Decimation Property 229 9.3 Linear Complexity 229 9.4 Security against a Decision Tree Attack 233 9.5 Sums of DSC Sequences 247 9.5.1 Linear Complexity Analysis 248 9.5.2 Balance Analysis 248 9.5.3 Correlation Analysis 249 9.5.4 Differential Analysis 249 10 Nonbinary Cyclotomic Generators 251 10.1 The rth-order Cyclotomic Generator 251 10.2 Linear Complexity 252 10.3 Autocorrelation Property 255 10.4 Decimation Property 256 10.5 Ideas Behind the Cyclotomic Generators 257

Contents xv 11 Generators Based on Permutations 259 11.1 The Cryptographic Idea 259 11.2 Permutations on Finite Fields 261 11.2.1 Dickson Permutation Polynomials 262 11.2.2 Linearized Permutation Polynomials 262 11.2.3 Permutation Polynomials of the Form x(q+rn-i)/m + ax262 11.2.4 Permutation Polynomials of the Form x r (g{x 8 ))( q - 1)/s 262 11.2.5 Cohen Permutation Polynomials 263 11.3 A Generator Based on Inverse Permutations 263 11.4 Binary Generators and Permutations of GF(2 n ) 264 11.4.1 APN Permutations and their Properties 266 11.4.2 Quadratic Permutations with Controllable Nonlinearity270 11.4.3 Permutations of Order 3 272 11.4.4 APN Permutations of Order n - 1 273 11.4.5 Permutations of Order n - 2 274 11.4.6 Permutations X d with d = 2 m - 1 275 11.4.7 APN Permutations via Crosscorrelation Function... 276 11.4.8 Other Power Functions with Good Nonlinearity... 280 11.4.9 Choosing the Linear Functions 280 11.5 Cyclic-Key Generators and their Problems 281 11.5.1 Cyclic-Key Generators 281 11.5.2 Several Specific Forms: An Overview 284 11.6 A Generator Based on Permutations of Z m 286 12 Quadratic Partitions and Cryptography 295 12.1 Quadratic Partition and Cryptography 296 12.2 p = x 2 + y 2 and p = x 2 + 4y 2 297 12.3 p = x 2 + 2y 2 and p = x 2 + 3y 2 304 12.4 p = x 2 + ny 2 and Quadratic Reciprocity 305 12.5 p = x 2 + 7y 2 and Quadratic Forms 306 12.6 p = x 2 + 15y 2 and Genus Theory 310 12.7 p = x 2 + ny 2 and Class Field Theory 311 12.8 Other Cryptographic Quadratic Partitions 314 13 Group Characters and Cryptography 317 13.1 Group Characters 317 13.2 Field Characters and Cryptography 319 13.2.1 Field Multiplicative Characters: Most Used Ones... 321 13.2.2 Field Additive Characters: Most Used Ones 323 13.3 Group Characters and Cyclotomic Numbers 329 13.4 The Nonlinearity of Characters 333 13.4.1 The Nonlinearity of Multiplicative Characters 333

xvi Contents 13.4.2 The Nonlinearity of Additive Characters 335 13.5 Ring Characters and Cryptography 335 14 P-Adic Numbers, Class Numbers and Sequences 337 14.1 The 2-Adic Value and 2-Adic Expansion 337 14.2 A Fast Algorithm for the 2-Adic Expansion 343 14.3 The Arithmetic of Q [2 ] and Z [2 ] 343 14.4 Feedback Shift Registers with Carry 349 14.5 Analysis and Synthesis of FCSRs 351 14.6 The 2-Adic Span and 2-RA Algorithm 356 14.7 Some Properties of FCSR Sequences 366 14.8 Blum-Blum-Shub Sequences & Class Numbers 370 15 Prime Ciphering Algorithms 379 15.1 Prime-32: A Description 379 15.2 Theoretical Results about Prime-32 385 15.3 Security Arguments 386 15.4 Performance of Prime-32 389 15.5 Prime-32 with a 192-Bit Key 389 15.6 Prime-64 389 16 Cryptographic Problems and Philosophies 391 16.1 Nonlinearity and Linearity 391 16.2 Stability and Instability 394 16.2.1 Stability and Diffusion 395 16.2.2 Correlation Stability and Pattern Stability 397 16.2.3 Mutual Information Stability 397 16.3 Localness and Globalness 399 16.4 Goodness and Badness 400 16.5 About Good plus Good 401 16.6 About Good plus Bad 403 16.7 About Bad plus Good 403 16.8 Hardware and Software Model Complexity 404 Appendices 407 A More About Cyclotomic Numbers 407 A.I Cyclotomic Numbers of Order 7 407 A.2 Cyclotomic Numbers of Orders 9, 18 409 A.3 Cyclotomic Numbers of Order Eleven 410 A.4 On Other Cyclotomic Numbers 411 A.5 Behind Cyclotomic Numbers 411

Contents B Cyclotomic Formulae of Orders 6, 8 and 10 C Finding Practical Primes D List of Research Problems E Exercises F List of Mathematical Symbols Bibliography Index xvu 415 423 425 429 435 437 472