首页 | 本学科首页   官方微博 | 高级检索  
     


New application methods for word-oriented cryptographic primitives
Authors:YANG Yang,ZENG Guang,JIN ChengHui,& QU YunYing,Zhengzhou Information Science  Technology Institute,Zhengzhou,China  ,State
Affiliation:Key Laboratory of Information Security,Institute of Software,Chinese Academy of Sciences,Beijing 100190,China
Abstract:Modern software oriented symmetric ciphers have become a key feature in utilizing word-oriented cryptographic primitives.Using the output sequence,in the order of its generation,of a word-oriented cryptographic primitive in the same way as traditional bit-oriented primitives,we can expose the intrinsic weakness of these primitives,especially for word-oriented linear feedback shift registers,T-functions,and so on.Two new methods for using word-oriented cryptographic primitives are presented in this paper,that is,the extracted state method and cascading extracted coordinate method.Using a T-function as an example,we research the different cryptographic properties of the output sequences of the original method and the two proposed methods,focusing mainly on period,linear complexity,and k-error linear complexity.Our conclusions show that the proposed methods could enhance at low cost the cryptographic properties of the output sequence.As a result,since the new methods are simple and easy to implement,they could be used to design new word-oriented cryptographic primitives.
Keywords:stream cipher  single cycle T-function  linear complexity  k-error linear complexity
本文献已被 CNKI 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号