Skip to main content

Non-linear Combinations of LFSRs

  • Chapter
Stream Ciphers

Abstract

As we have seen in the previous chapter a secure cipher need at least one nonlinear part. The natural way to proceed is to study nonlinear combinations of LFSRs. In this chapter we will meet for the first time the three big attack classes (correlation attacks, algebraic attacks, time-memory trade-off attacks). Which are central elements in the following chapters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. van Aardenne-Ehrenfest, T., de Bruijn, N.G.: Circuits and trees in oriented linear graphs. Bull. Belg. Math. Soc. Simon Stevin 28, 203–217 (1951)

    MATH  Google Scholar 

  2. Bach, E.: Improved asymptotic formulas for counting correlation-immune Boolean functions. Technical report 1616, Computer Science Dept., University of Wisconsin (2007)

    Google Scholar 

  3. Bernasconi, J., Günter, C.G.: Analysis of nonlinear feedback logic for binary sequence generators. In: Advances in Cryptology—Eurocrypt ’85. LNCS, vol. 219, pp. 161–166 (1986)

    Google Scholar 

  4. Camion, P., Carlet, C., Charpin, P., Sendrier, N.: On correlation-immune functions. In: Feigenbaum, J. (ed.) Advances in Cryptology—CRYPTO’91. Lecture Notes in Computer Science, vol. 576, pp. 86–100. Springer, Berlin (1992)

    Google Scholar 

  5. Camion, P., Canteaut, A.: Generalization of Siegenthaler inequality and Schnorr-Vaudenay multipermutations. In: Advances in Cryptology—CRYPTO ’96 (Santa Barbara, CA). Lecture Notes in Comput. Sci., vol. 1109, pp. 372–386. Springer, Berlin (1996)

    Google Scholar 

  6. Canfield, E.R., Gao, Z., Greenhill, C., McKay, B.D., Robinson, R.W.: Asymtotic enumeration of correlation-immune Boolean functions. Cryptogr. Commun. 2, 111–126 (2010). arXiv:0909.3321

    Article  MathSciNet  MATH  Google Scholar 

  7. Carlet, C., Gouget, A.: An upper bound on the number of m-resilient Boolean functions. In: ASIACRYPT 2002. LNCS, vol. 2501, pp. 484–496. Springer, Berlin (2002)

    Chapter  Google Scholar 

  8. Carlet, C., Klapper, A.: Upper bounds on the number of reslient functions and of bent functions. In: Lecture Notes Dedicated to Philippe Desarte. Springer Verlag, to appear. A shorter version has appeared in the Proceedings of the 23rd Symposium on Information Theory in the Benelux, Louvain-La-Neuve, Belgian, 2002

    Google Scholar 

  9. de Bruijn, N.G.: A combinatorial problem. Nedel. Akad. Wetensch. Proc. 49, 758–764 (1946). other name: Indag. Math. 8, 461–467 (1946)

    MATH  Google Scholar 

  10. de Bruijn, N.G.: Acknowledgment of priority to C. Fyle Sainte-Marie on the counting of circular arrangements of 2n zeroes and ones that show each n-letter word exactly once. Technical Report TH-Report 75-WSK-06, Technolocical University Eidhoven, June 1975

    Google Scholar 

  11. Denisov, O.V.: An asymptotic formula for the number of correlation-immune boolean functions of order k. Discrete Appl. Math. 2(4), 407–426 (1992). English Translation from Diskr. Math. 3(2), 25–46 (1991)

    MathSciNet  Google Scholar 

  12. Denisov, O.V.: A local limit theorem for the distribution of a part of the spectrum of a random binary function. Discrete Appl. Math. 10, 87–101 (2000). English Translation from Diskr. Math. 12, 1 (2000)

    MathSciNet  MATH  Google Scholar 

  13. Geffe, P.R.: How to protect data with ciphers that are really hard to break. Electronics 4, 129–156 (1973)

    Google Scholar 

  14. Golić, J.Dj.: Cryptanalysis of the alleged A5 stream cipher. In: Advances in Cryptology—EUROCRYPTO ’97. LNCS, vol. 1233, pp. 239–255. Springer, Berlin (1997)

    Google Scholar 

  15. Good, I.J.: Normal recurring decimals. J. Lond. Math. Soc. 21(3), 169–172 (1946)

    Article  Google Scholar 

  16. Gopalakrishnan, K., Stinson, D.R.: Three characterisations of non-binary correlation-immune and resilient functions. Des. Codes Cryptogr. 5, 241–251 (1995)

    Article  MathSciNet  MATH  Google Scholar 

  17. Mitchell, C.: Enumerating Boolean functions of cryptographic significance. J. Cryptol. 2, 155–170 (1990)

    Article  MATH  Google Scholar 

  18. Palmer, E.M., Read, R.C., Robonson, R.W.: Balancing the n-cube: a census of colorings. J. Algebr. Comb. 1, 257–273 (1992)

    Article  MATH  Google Scholar 

  19. de Riviére, A.: Question 48. l’Intermédiare des Mathématiciens 1, 19–20 (1894)

    Google Scholar 

  20. Rueppel, R.A.: Analysis and Design of Stream Chiphers. Springer, Berlin (1986)

    Book  Google Scholar 

  21. Rueppel, R.A., Staffelbach, O.J.: Products of linear recurring sequences with maximum complexity. IEEE Trans. Inf. Theory 33, 124–131 (1987)

    Article  MATH  Google Scholar 

  22. Sainte-Marie, Fly C.: Solution to question 48. l’Intermédiare des Mathématiciens 1, 107–110 (1894)

    Google Scholar 

  23. Schneider, M.: A Note on the Construction and Upper Bounds of Correlation-Immune Functions. LNCS, vol. 1355, 295–306 (1997)

    Google Scholar 

  24. Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Inf. Theory 30, 776–780 (1984)

    Article  MathSciNet  MATH  Google Scholar 

  25. Tutte, W.T.: The dissection of equilateral triangles into equilateral triangles. Proc. Camb. Philos. Soc. 44, 463–482 (1948)

    Article  MathSciNet  MATH  Google Scholar 

  26. Xiao, G.Z., Massey, M.L.: A spectral characterisation of correlation immune combining functions. IEEE Trans. Inf. Theory 34, 569–571 (1988)

    Article  MathSciNet  MATH  Google Scholar 

  27. Yang, Y.X., Guo, B.: Further enumerating Boolean functions of cryptographic significance. J. Cryptol. 8, 115–122 (1995)

    MathSciNet  MATH  Google Scholar 

  28. Zhang, J.Z., You, Z.S., Li, Z.L.: Enumeration of binary orthogonal arrays of strength 1. Discrete Math. 239, 191–198 (2001)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Klein, A. (2013). Non-linear Combinations of LFSRs. In: Stream Ciphers. Springer, London. https://doi.org/10.1007/978-1-4471-5079-4_3

Download citation

Publish with us

Policies and ethics