Skip to main content
Log in

Modified Alternating \(\vec{k}\)–generators

  • Published:
Designs, Codes and Cryptography Aims and scope Submit manuscript

Abstract

This paper deals with a class \(\mathcal{MAG}_{\vec{k}}\) of pseudorandom bit generators – modified alternating \(\vec{k}\)–generators. This class is constructed similarly to the class \(\mathcal{ASG}_{\vec{k}}\) of alternating step generators. Three subclasses of \(\mathcal{MAG}_{\vec{k}}\) are distinguished, namely linear, mixed and nonlinear generators. The main attention is devoted to the subclass \(\mathcal{MAG}_{\vec{k}}^{max}\) of linear and mixed generators generating periodic sequences with maximal period lengths. A necessary and sufficient condition for all sequences generated by the linear generators of \(\mathcal{MAG}_{\vec{k}}\) to be with maximal period lengths is formulated. Such sequences have good statistical properties, such as distribution of zeroes and ones, and large linear complexity. Two methods of cryptanalysis of the proposed generators are given. Finally, three new classes of modified alternating \(\vec{k}\)–generators, designed especially to be more secure, are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Similar content being viewed by others

References

  • D. Gollmann, Pseudorandom properties of cascade connection of clock controlled shift-registers, Advances in Cryptology — Eurocrypt ‘84, Springer-Verlag (1984) pp. 93–98.

  • S. W. Golomb (Eds) (1982) Shift-register Sequences Aegan Park Press Laguna Hills, CA

    Google Scholar 

  • C. G. Günther,Alternating Step Generators Controlled by de Bruijn sequences,Advances in Cryptology — Eurocrypt ‘87, Lecture Notes in Computer Science, Springer-Verlag (1988) pp. 5–14.

  • M. Lasota, The controlled (k,m)-generators of pseudorandom sequences (In Polish),Master Thesis at Maria Curie-Sklodowksa University of Lublin, (2001).

  • A. Menezes, P. von Orrshot and S. Vanstone,Handbook of Applied Cryptography,CRC Press, (1996).

  • NIST, Federal Information Processing Standards Publication 140-2, Security Requirements for Cryptographic Modules, (2001).

  • R.A. Rueppel (Eds) (1986) Analysis and Design of Stream Ciphers Springer-Verlag Berlin

    Google Scholar 

  • E. Zenner, On the efficiency of the clock control guessing attack, to appear in the Proceedings of the ICISC 2002, LNCS, Springer-Verlag, (2003).

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rafał Białota.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Białota, R., Kawa, G. Modified Alternating \(\vec{k}\)–generators. Des Codes Crypt 35, 159–174 (2005). https://doi.org/10.1007/s10623-005-6399-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10623-005-6399-9

Keywords

Navigation