Designs, Codes and Cryptography

, Volume 35, Issue 2, pp 159–174 | Cite as

Modified Alternating \(\vec{k}\)–generators

  • Rafał Białota
  • Grzegorz Kawa


This paper deals with a class \(\mathcal{MAG}_{\vec{k}}\) of pseudorandom bit generators – modified alternating \(\vec{k}\)–generators. This class is constructed similarly to the class \(\mathcal{ASG}_{\vec{k}}\) of alternating step generators. Three subclasses of \(\mathcal{MAG}_{\vec{k}}\) are distinguished, namely linear, mixed and nonlinear generators. The main attention is devoted to the subclass \(\mathcal{MAG}_{\vec{k}}^{max}\) of linear and mixed generators generating periodic sequences with maximal period lengths. A necessary and sufficient condition for all sequences generated by the linear generators of \(\mathcal{MAG}_{\vec{k}}\) to be with maximal period lengths is formulated. Such sequences have good statistical properties, such as distribution of zeroes and ones, and large linear complexity. Two methods of cryptanalysis of the proposed generators are given. Finally, three new classes of modified alternating \(\vec{k}\)–generators, designed especially to be more secure, are presented.


keystream generators stream ciphers shift-registers 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. D. Gollmann, Pseudorandom properties of cascade connection of clock controlled shift-registers, Advances in Cryptology — Eurocrypt ‘84, Springer-Verlag (1984) pp. 93–98.Google Scholar
  2. Golomb, S. W. eds. 1982Shift-register SequencesAegan Park PressLaguna Hills, CAGoogle Scholar
  3. C. G. Günther,Alternating Step Generators Controlled by de Bruijn sequences,Advances in Cryptology — Eurocrypt ‘87, Lecture Notes in Computer Science, Springer-Verlag (1988) pp. 5–14.Google Scholar
  4. M. Lasota, The controlled (k,m)-generators of pseudorandom sequences (In Polish),Master Thesis at Maria Curie-Sklodowksa University of Lublin, (2001).Google Scholar
  5. A. Menezes, P. von Orrshot and S. Vanstone,Handbook of Applied Cryptography,CRC Press, (1996). Google Scholar
  6. NIST, Federal Information Processing Standards Publication 140-2, Security Requirements for Cryptographic Modules, (2001).Google Scholar
  7. Rueppel, R.A. eds. 1986Analysis and Design of Stream CiphersSpringer-VerlagBerlinGoogle Scholar
  8. E. Zenner, On the efficiency of the clock control guessing attack, to appear in the Proceedings of the ICISC 2002, LNCS, Springer-Verlag, (2003).Google Scholar

Copyright information

© Springer Science+Business Media, Inc. 2005

Authors and Affiliations

  1. 1.Africa System S.A.LublinPoland
  2. 2.Maria Curie-Sklodowska UniversityLublinPoland

Personalised recommendations