Skip to main content

Counting Functions and Expected Values in the Stability Theory of Stream Ciphers

  • Conference paper
Sequences and their Applications

Abstract

In the stability theory of stream ciphers, the philosophy is that a good keystream should not only have a large linear complexity, but that a small number of bit changes should not cause a significant drop in the linear complexity. This requirement leads to the concept of the k -error linear complexity L n , k (S) of a bit string S of length n. The main results of the paper concern the number of bit strings S of length n with a given value of L n , k (S) or with a given upper bound on L n , k (S). On the basis of these results, bounds for the expected value of L n , k (S) for fixed n and k and random bit strings S of length n are established.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. G. Cohen, L Honkala, S. Litsyn, and A. Lobstein, “Covering Codes”, Elsevier, Amsterdam, 1997.

    Google Scholar 

  2. C. Ding, G. Xiao, and W. Shan, “The Stability Theory of Stream Ciphers”, Lecture Notes in Computer Science, Vol. 561, Springer-Verlag, Berlin, 1991.

    Google Scholar 

  3. F.G. Gustayson, Analysis of the Berlekamp-Massey linear feedback shift-register synthesis algorithm, IBM J. Res. Develop. 20 (1976), 204–212.

    Article  MathSciNet  Google Scholar 

  4. T. Kaida, S. Uehara, and K. Imamura, A new algorithm for the k -error linear complexity of sequences over GF(pm)with period pn, this volume.

    Google Scholar 

  5. H. Niederreiter, Sequences with almost perfect linear complexity profile, in “Advances in Cryptology — EUROCRYPT ‘87” (D. Chaum and W.L. Price, eds.), Lecture Notes in Computer Science, Vol. 304, pp. 37–51, Springer-Verlag, Berlin, 1988.

    Google Scholar 

  6. H. Niederreiter, Some computable complexity measures for binary sequences, this volume.

    Google Scholar 

  7. R.A. Rueppel, “Analysis and Design of Stream Ciphers”, Springer-Verlag, Berlin, 1986.

    Book  Google Scholar 

  8. R.A. Rueppel, Stream ciphers, in “Contemporary Cryptology: The Science of Information Integrity” (G.J. Simmons, ed.), pp. 65–134, IEEE Press, New York, 1992.

    Google Scholar 

  9. M. Stamp and C.F. Martin, An algorithm for the k -error linear complexity of binary sequences with period 2n IEEE Trans. Inform. Theory 39 (1993), 1398–1401.

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag London

About this paper

Cite this paper

Niederreiter, H., Paschinger, H. (1999). Counting Functions and Expected Values in the Stability Theory of Stream Ciphers. In: Ding, C., Helleseth, T., Niederreiter, H. (eds) Sequences and their Applications. Discrete Mathematics and Theoretical Computer Science. Springer, London. https://doi.org/10.1007/978-1-4471-0551-0_24

Download citation

  • DOI: https://doi.org/10.1007/978-1-4471-0551-0_24

  • Publisher Name: Springer, London

  • Print ISBN: 978-1-85233-196-2

  • Online ISBN: 978-1-4471-0551-0

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics