CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Analysis of Linear Feedback Shift Registers in Stream Ciphers

by Faheem Masoodi, Shadab Alam, M U Bokhari
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 46 - Number 17
Year of Publication: 2012
Authors: Faheem Masoodi, Shadab Alam, M U Bokhari
10.5120/7013-9714

Faheem Masoodi, Shadab Alam, M U Bokhari . An Analysis of Linear Feedback Shift Registers in Stream Ciphers. International Journal of Computer Applications. 46, 17 ( May 2012), 46-49. DOI=10.5120/7013-9714

@article{ 10.5120/7013-9714,
author = { Faheem Masoodi, Shadab Alam, M U Bokhari },
title = { An Analysis of Linear Feedback Shift Registers in Stream Ciphers },
journal = { International Journal of Computer Applications },
issue_date = { May 2012 },
volume = { 46 },
number = { 17 },
month = { May },
year = { 2012 },
issn = { 0975-8887 },
pages = { 46-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume46/number17/7013-9714/ },
doi = { 10.5120/7013-9714 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:40:02.633544+05:30
%A Faheem Masoodi
%A Shadab Alam
%A M U Bokhari
%T An Analysis of Linear Feedback Shift Registers in Stream Ciphers
%J International Journal of Computer Applications
%@ 0975-8887
%V 46
%N 17
%P 46-49
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Linear Feedback Shift Registers (LFSRs) have always received considerable attention in cryptography. Owing to the good statistical properties, large period and low implementation costs, LFSR have achieved wide acceptance in developing stream ciphers. This paper intends to present a self-contained and comprehensive analysis of linear feedback shift registers and their application in stream ciphers. This research focuses on analyzing the mechanism of an LFSR, the two implementation variations and various properties of LFSR, which play a vital role in stream cipher design. In the last section of this paper, we address the security aspect of LFSR based stream ciphers and different techniques to enhance it.

References
  1. Sun Jing, Yang jing-yu, Fu De-sheng: Research On the Security of Key Generator in Stream Ciphers: The 1st International Conference on information Science and engineering (ICISE2009) pp. 1831—834
  2. P. P. Deepthi, Deepa Sara John and P. S. Sathidevi: Design and analysis of a highly secure stream cipher based on linear feedback shift register, Elsevier, computers and electrical engineering (2009), pp 235-243.
  3. Myat Su Mon Win: A New Approach to Feedback Shift Register: World Academy of Science, Engineering and Technology 48 2008 pp. 185—189
  4. A. Ahmad and A. M Elabdallai. : An Efficient Method to Determine Linear Feedback Connections in Shift Registers That Generate Maximal Length Pseudo-Random Up And Down Binary Sequences. Computer Electronic Engineering Vol. 23, No. 1 pp. 33-39, 1997
  5. Bruce Schneider: Applied Cryptography, Second Edition: Protocols, Algorithms, and Source Code in C. (1996)
  6. Kencheng Zeng, Chung-Hung Yang, Dah-Yea Wei and T. R. N Rao. : Pseudorandom Bit Generators in Stream-Cipher Cryptography: IEEE (1991)
  7. Cagigal, N. P; Bracho, S: Algorithmic Determination of linear feedback in a Shift Register for pseudorandom binary sequence generation: Electronic Circuits and Systems, IEE Proceedings. 1986 pp. 191 - 194 Vol. 133
  8. Elena Dubrova, A Transformation from the Fibonacci to the Galois NLFSRs, IEEE Transaction on Information Theory, Vol 55, No. 11, NOV 2009, pp 5263-5271
  9. Chapter 2- Introduction to stream Cipher pp. 17—39
  10. Martin Voros: Algebraic Attack on Stream Ciphers, 2007
  11. Gregor Leander, Erik Zenner, and Philip Hawkes: Cache Timing Analysis of LFSR-based Stream Ciphers:
  12. A. A. Bruen and R. A. Mollin, Cryptography and Shift Registers, The Open Mathematics Journal, 2009, pp 16-21.
  13. M U Bokhari and Faheem Masoodi. : Comparative Analysis of Structures and Attacks on Various Stream Cipher: Proceedings of the 4th National Conference; INDIACom-2010. (2010) pp. 236—238.
  14. Faheem Masoodi, Shadab Alam and M U Bokhari. : SOBER Family of Stream Ciphers: A Review: International Journal of Computer Applications (2011), Vol. 23.
  15. Mark Goresky: Fibonacci and Galois Representation of Feedback-with-carry shift registers, IEEE Transactions on Information Theory, Vol 48, Nov 2002
  16. Meltem Do?aner Özgan: A NEW NONLINEAR COMBINATION GENERATOR "MYBOUN", 2006
  17. W. Liang and Long Jing, A cryptographic Algorithm Based on Linear Feedback Shift Register, 2010 International conference on computer application and system Modeling (ICCASM 2010), v15, pp 526-529
  18. Muzamil Mahgoub Yahia, Linear Complexity in LFSR-based Stream Ciphers, May 2011
Index Terms

Computer Science
Information Sciences

Keywords

Lfsr Linear Complexity Period Nlfsr Stream Cipher