Browse > Article
http://dx.doi.org/10.6109/jkiice.2015.19.5.1104

A proposal of binary sequence generator, Threshold Clock-Controlled LM-128  

Jo, Jung-bok (Division of Computer Engineering, Dongseo University)
Abstract
Due to the rapid growth in digital contents, it is important for us to design a high speed and secure encryption algorithm which is able to comply with the existing and future needs. This paper proposes an alternative approach for self-decimated LM-128 summation sequence generator, which will generate a higher throughput if compared to the conventional generator. We design and implement a threshold clock-controlled LM-128 and prove that it has a lower clock cycle and hence giving a higher key stream generation speed. The proposed threshold clock-control LM-128 generator consists of 256 bits inner state with 128 bits secret key and initialization vector. The cipher achieves a security level of 128 bits to be adapted to the digital contents security with high definition and high quality.
Keywords
keystream; binary sequence; clock-control; LM-128;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Hoonjae Lee, Sangjae Moon, "On an Improved Summation Generator with 2-Bit Memory," Signal Processing, Vol. 80, no. 1. pp. 211-217, Jan. 2000.   DOI
2 A. Menezes, HandBook of Applied Cryptography, CRC Press, 2001.
3 J. Massey. "Shift-Register Synthesis and BCH Decoding," IEEE Transactions on Information Theory, IT-15, no. 1, pp. 122-127, Jan. 1969.   DOI
4 C. Paar, J. Pelzl, “Stream Ciphers”, Chapter 2 of Understanding Cryptography, A Textbook for Students and Practitioners.(companion web site contains online cryptography course that covers stream ciphers and LFSR), Springer, 2009.
5 P. Kitsos, N. Sklavos, K. Papadomanolakis and O. Koufopavlou, “Hardware Implementation of Bluetooth Security”, IEEE Pervasive Computing, vol. 2, no. 1, pp. 21-29, Jan.-Mar. 2003.   DOI
6 V. S. Pendluri, P. Gupta, R. Majumdar, "Design and Implementation of Keystream Generator with Improved Security," in ICACT2011, Gangwon-Do, pp. 1626-1631, 2011.
7 P. Chandra, Bulletproof Wireless Security - GSM, UTMS, 802.11 and Ad Hoc Security, Elsevier, 2005.
8 J. Kim, S. Cho, T. Kim and Hoonjae Lee, "A proposal of the Self_Decimated LM-128 Keystream Generator," in Proceeding of the 21th KIPS Spring Conference, Seoul, pp. 1011-1014, 2004.
9 R. Rueppel, "Correlation Immunity and the Summation Generator," Advance in Cryptology -CRYPTO '85, Lecture Notes in Computer Science, Vol. s18, pp. 260-272, Springer-Verlag, 1985.
10 W. Meier and O. Staffelbach. "Correlation Properties of combiners with Memory in Stream Ciphers," Advance in Cryptology -EUROCRYPT '90, Lecture Notes in Computer Science, Vol. 473, pp. 204-312, Springer-Varlag, 1990.