Book contents
- Frontmatter
- Contents
- Contributors
- Introduction
- I NUMBER THEORETIC ASPECTS OF CRYPTOLOGY
- II CRYPTOGRAPHIC DEVICES AND APPLICATIONS
- 7 Security in telecommunication services over the next decade
- 8 Linear feedback shift registers and stream ciphers
- 9 Applying randomness tests to commercial level block ciphers
- 10 Pseudo-random sequence generators using structured noise
- 11 Privacy for MACNET
- 12 Authentication
- 13 Insecurity of the knapsack one-time pad
- 14 The tactical frequency management problem: heuristic search and simulated annealing
- 15 Reed-Solomon coding in the complex field
- PART III DIOPHANTINE ANALYSIS
10 - Pseudo-random sequence generators using structured noise
Published online by Cambridge University Press: 05 May 2013
- Frontmatter
- Contents
- Contributors
- Introduction
- I NUMBER THEORETIC ASPECTS OF CRYPTOLOGY
- II CRYPTOGRAPHIC DEVICES AND APPLICATIONS
- 7 Security in telecommunication services over the next decade
- 8 Linear feedback shift registers and stream ciphers
- 9 Applying randomness tests to commercial level block ciphers
- 10 Pseudo-random sequence generators using structured noise
- 11 Privacy for MACNET
- 12 Authentication
- 13 Insecurity of the knapsack one-time pad
- 14 The tactical frequency management problem: heuristic search and simulated annealing
- 15 Reed-Solomon coding in the complex field
- PART III DIOPHANTINE ANALYSIS
Summary
Stream ciphers use the output of a Pseudo-Random (PR) generator to mask the information stream. The security of these cipher systems ultimately depends on the structure of the PR generator. There are some minimum necessary criteria such as long period, flat statistical distribution and high linear complexity that the PR generator of a stream cipher system should satisfy to resist the basic cryptanalytic attacks on such systems. We propose a class of PR generators using the coset elements of a Reed-Muller code. The linear complexity of these generators is analysed and conditions that assure the highest possible linear complexity for them are specified. It is shown that the above mentioned criteria do not gurantee the security of a stream cipher system and the proposed PR generator, although it satisfies all of them, is not secure.
Introduction
Stream ciphers assimilate the one time pad, the only provably perfect secure system. However with the replacement of the random generator by a pseudo-random (PR) one, the perfect security of the system vanishes. It is easy to see that the assessment of the security of these systems is directly related to the properties of the PR generator. There are some necessary criteria which must be satisfied by the PR generator of a secure stream cipher. It is recognised that these generators should satisfy Golomb's criteria and have high linear complexity [1], [3].
- Type
- Chapter
- Information
- Number Theory and Cryptography , pp. 129 - 136Publisher: Cambridge University PressPrint publication year: 1990
- 2
- Cited by