ACISP 1998: Information Security and Privacy pp 135-146 | Cite as
A stream cipher based on linear feedback over GF(28)
Abstract
Embedded applications such as voice encryption in wireless telephones can place severe constraints on the amount of processing power, program space and memory available for software encryption algorithms. Additionally, some protocols require some form of two-level keying which must be reasonably fast. This paper introduces a mechanism for creating a family of stream ciphers based on Linear Feedback Shift Registers over the Galois Finite Field of order 2n, where n is chosen to be convenient for software implementation. A particular stream cipher based on this methodology, SOBER, is presented and analysed.
Keywords
Recurrence Relation Mobile Station Table Lookup Shift Register Stream CipherPreview
Unable to display preview. Download preview PDF.
References
- 1.See Ross Anderson's posting on USENET newsgroup sci.crypt, “Subject: A5 (Was: HACKING DIGITAL PHONES)”, 17 Jun 1994,. Alternatively, S. B. Xu, D. K. He, and X. M. Wang, “An implementation of the GSM General Data Encryption Algorithm A5”, CHINACRYPT '94, Xidian, China, 11–15 November 1994, pp 287–291 (in Chinese). The latter appears to be based on the same information as Anderson's posting (or possibly the posting itself) as Anderson states that two of the registers have unknown polynomials, but the polynomials are the same in his posting and Xu et.al.Google Scholar
- 2.W. Caelli, E Dawson, L. Nielsen, H. Gustafson, “CRYPT-X Stastical Package Manual, Measuring the strength of Stream and Block Ciphers”, Queensland Univeristy of Technology, 1992, ISBN 0-86856-8090.Google Scholar
- 3.T. Herlestam, “On functions of Linear Shift Register Sequences”, in Franz Pichler, editor, Proc. EUROCRYPT 85, LNCS 219, Springer-Verlag 1986.Google Scholar
- 4.G. Marsaglia, “DIEHARD”, http://stat.fsu.edu/~geo/diehard.html Google Scholar
- 5.A. Menezes, P. Van Oorschot, S. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1997, Ch 6.Google Scholar
- 6.C. Paar, Ph.D. Thesis, “Efficient VLSI Architectures for Bit-Parallel Computation in Galois Fields”, Institute for Experimental Mathematics, University of Essen, 1994, ISBN 3-18-332810-0.Google Scholar
- 7.B. Schneier, “Applied Cryptography Second Edition”, Wiley 1996, pp. 369–413.Google Scholar
- 8.TIA/EIA Standard IS-54B, Telecommunications Industry Association, Vienna VA., USA.Google Scholar