Abstract
Methods of construction of synchronous SSC are divided into two large groups: with uniform movement of shift registers and PRS generators with uneven movement (shift) of registers. In the first case, all LFSR used in the PRS generator are shifted by the same clock signals, i.e the movement of registers is uniform (uniform). This greatly simplifies the implementation of generators and usually increases their performance. Compared to this approach, in non-uniform motion generators, different LFSR can be shifted by different clock signals. This is achieved either through the use of the so-called control register—one of the used in the scheme of the generator LFSR performs the function of controlling the clock frequency of other LFSR. Another approach is to build generators in which the clock speed of the individual LFSR is determined by the logic of the feedback or certain functional transformations between the outputs or contents of the LFSR used in the generator. Such schemes are commonly called self-managed generators. Methods of construction of synchronous SSC with uneven movement of registers, as a rule, have a more complex structure, which reduces the performance of the respective generators. However, cryptographic analysis of such algorithms is usually much more complicated, in particular, the linear complexity of the formed SSC is usually higher than in the schemes with uniform movement of registers.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Menicocci R.: Short Gollmann Cascade generators may be insecure. In: Proceedings of the 4th IMA Conference on Cryptography and Coding, Cirencester (1993)
HÃ¥stad, J., Mats Näslund. BMGL: Synchronous KeyÂstream Generator with Provable Security. http://www.cryptonessie.org
Coppersmith, D., Krawczyk, H., Mansour, Y.: The shrinking generator. Advances in Cryptology: CRYPTO’93, Springer Verlag (1994)
Reeds, J.A., Sloane, N.J.A.: ShiftÂregister synthesis [Electronic resourse]. Access mode: http://web.archive.org/web/20120829171715/http://www2.research.att.com/~njas/doc/1218shift.pdf
Rueppel, R.A.: Analysis and design of stream ciphers. Berlin, SpringerÂVerlag. 244 p. (1986)
Anin, B.Y.: Protection of computer information. SPb .: BKhVSt. Petersburg, 384 c (2000)
Alferov, A.P, Zubov, A.Y., Kuzmin, A.S., Cheremushkin, A.V.: Fundamentals of cryptography, Helios ARV, 480 p (2005)
Gorbenko, I.D, Gorbenko, Y.I.: Applied cryptology: Monograph. Kharkiv: KNURE, Fort, 1st and 2nd editions, 868 p (2012)
Gorbenko, I.D., Gorbenko, Y.I.: Applied cryptology: Textbook. Kharkiv, KNURE, Fort, 1st and 2nd editions, 878 p (2012)
Gorbenko, Y.I., Potiy, A.V., Izbenko, Y.A., Orlova, S.Y.: Analysis of current encryption schemes submitted to the European competition NESSIE//Legal, regulatory and metrological support of the information protection system in Ukraine: scientific and technical collection, Vip. 5, pp. 92–110 (2002)
Ross Anderson: A5—The GSM encryption algorithm [Electronic resourse]. Access mode: http://www.ussrback.com/crypto/source/algorithms/A5ÂGSMÂAlgorithm.txt
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Kuznetsov, A.A., Potii, O.V., Poluyanenko, N.A., Gorbenko, Y.I., Kryvinska, N. (2022). Analysis of Synchronous Stream Cryptoconversions. In: Stream Ciphers in Modern Real-time IT Systems. Studies in Systems, Decision and Control, vol 375. Springer, Cham. https://doi.org/10.1007/978-3-030-79770-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-79770-6_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-79769-0
Online ISBN: 978-3-030-79770-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)