Skip to main content

Analysis of Synchronous Stream Cryptoconversions

  • Chapter
  • First Online:
Stream Ciphers in Modern Real-time IT Systems

Abstract

Methods of construction of synchronous SSC are divided into two large groups: with uniform movement of shift registers and PRS generators with uneven movement (shift) of registers. In the first case, all LFSR used in the PRS generator are shifted by the same clock signals, i.e the movement of registers is uniform (uniform). This greatly simplifies the implementation of generators and usually increases their performance. Compared to this approach, in non-uniform motion generators, different LFSR can be shifted by different clock signals. This is achieved either through the use of the so-called control register—one of the used in the scheme of the generator LFSR performs the function of controlling the clock frequency of other LFSR. Another approach is to build generators in which the clock speed of the individual LFSR is determined by the logic of the feedback or certain functional transformations between the outputs or contents of the LFSR used in the generator. Such schemes are commonly called self-managed generators. Methods of construction of synchronous SSC with uneven movement of registers, as a rule, have a more complex structure, which reduces the performance of the respective generators. However, cryptographic analysis of such algorithms is usually much more complicated, in particular, the linear complexity of the formed SSC is usually higher than in the schemes with uniform movement of registers.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 199.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 199.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Menicocci R.: Short Gollmann Cascade generators may be insecure. In: Proceedings of the 4th IMA Conference on Cryptography and Coding, Cirencester (1993)

    Google Scholar 

  2. Håstad, J., Mats Näslund. BMGL: Synchronous Key­stream Generator with Provable Security. http://www.cryptonessie.org

  3. Coppersmith, D., Krawczyk, H., Mansour, Y.: The shrinking generator. Advances in Cryptology: CRYPTO’93, Springer Verlag (1994)

    Google Scholar 

  4. Reeds, J.A., Sloane, N.J.A.: Shift­register synthesis [Electronic resourse]. Access mode: http://web.archive.org/web/20120829171715/http://www2.research.att.com/~njas/doc/1218shift.pdf

  5. Rueppel, R.A.: Analysis and design of stream ciphers. Berlin, Springer­Verlag. 244 p. (1986)

    Google Scholar 

  6. Anin, B.Y.: Protection of computer information. SPb .: BKhVSt. Petersburg, 384 c (2000)

    Google Scholar 

  7. Alferov, A.P, Zubov, A.Y., Kuzmin, A.S., Cheremushkin, A.V.: Fundamentals of cryptography, Helios ARV, 480 p (2005)

    Google Scholar 

  8. Gorbenko, I.D, Gorbenko, Y.I.: Applied cryptology: Monograph. Kharkiv: KNURE, Fort, 1st and 2nd editions, 868 p (2012)

    Google Scholar 

  9. Gorbenko, I.D., Gorbenko, Y.I.: Applied cryptology: Textbook. Kharkiv, KNURE, Fort, 1st and 2nd editions, 878 p (2012)

    Google Scholar 

  10. Gorbenko, Y.I., Potiy, A.V., Izbenko, Y.A., Orlova, S.Y.: Analysis of current encryption schemes submitted to the European competition NESSIE//Legal, regulatory and metrological support of the information protection system in Ukraine: scientific and technical collection, Vip. 5, pp. 92–110 (2002)

    Google Scholar 

  11. Ross Anderson: A5—The GSM encryption algorithm [Electronic resourse]. Access mode: http://www.ussrback.com/crypto/source/algorithms/A5­GSM­Algorithm.txt

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexandr Alexandrovich Kuznetsov .

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kuznetsov, A.A., Potii, O.V., Poluyanenko, N.A., Gorbenko, Y.I., Kryvinska, N. (2022). Analysis of Synchronous Stream Cryptoconversions. In: Stream Ciphers in Modern Real-time IT Systems. Studies in Systems, Decision and Control, vol 375. Springer, Cham. https://doi.org/10.1007/978-3-030-79770-6_4

Download citation

Publish with us

Policies and ethics