A Study on the Cryptographic Properties of FCSR Sequences

FCSR 난수열의 암호학적인 특성에 관한 연구

  • 서창호 (공주대학교 응용수학과) ;
  • 김정녀 (한국전자통신연구원 정보보호기술연구본부) ;
  • 조현숙 (한국전자통신연구원 정보보호기술연구본부) ;
  • 김석우 (한세대학교 정보통신학과)
  • Published : 2001.02.01

Abstract

A summation generator creates sequence from addition with carry of LFSR (Linear Feedback Shift Register) sequences. Similarly, it is possible to generate keystream by bitwise exclusive-oring on two FCSR sequences. In this paper, we described the cryptographic properties of a sequence generated by the FCSRs.

합산 난수 발생기(Summation Generator)는 LFSR의 출력 수열을 정수 합산하여 키 수열을 발생한다. 이와 유사하게 두개의 FCSR의 출력 수열을 상관관계에 안전한 비트별 논리합(bitwise exclusive-oring)을 이용한 이진 난수열 발생기를 제안하고, 출력된 수열의 암호학적 특성을 살펴본다.

Keywords

References

  1. R. A. Rueppel, 'Analysis and Design of Stream Ciphers', Springer-Verlag, Berlin, Heidelberg, New York, London, Paris, Tokyo, In Communications and Control Engineering Series, 1986
  2. R. A. Rueppel, 'Stream Ciphers, in Contemporary Cryptography : the Science of Information Integrity', Ch.2, pp.65-134, IEEE Press, 1992
  3. W. Meier and O. Staffelbach, 'Fast Correlation Attacks on Certain Stream Ciphers', Journal of Cryptology, Vol.1, No.3, pp.159-176, 1989 https://doi.org/10.1007/BF02252874
  4. R. A. Rueppel, 'Correlation Immunity and the Summation Generator,' Advances in Cryptology-CRYPTO'85, LNCS 196, pp.260-272, 1986 https://doi.org/10.1007/3-540-39799-X_20
  5. Meier and O. Staffelbach, 'Correlation Properties of combiners with memory in stream ciphers,' Journal of Cryptology, Vol.5, No.1, pp.67-86, 1992
  6. M. Goresky and A. Klapper, 'Feedback Registers based on Ramified Extensions of the 2-Adic Numbers,' Advances in Cryptology-CRYPTO'94, LNCS 950, pp.215-222, 1994 https://doi.org/10.1007/BFb0053437
  7. A. Klapper and M. Goresky, 'Large Period nearly debruijn FCSR Sequences,' Advances in Cryptology-CRYPTO'95, LNCS 921, pp.263-273, 1995
  8. Changho Seo, Sangjin Lee, Yeoulouk Sung, Keunhee Han, Sangchoon Kim, 'A lower bound on the linear span of an FCSR,' IEEE Trans. on Information Theory, Vol.46, No.2, pp.691-693, 2000 https://doi.org/10.1109/18.825844