共查询到19条相似文献,搜索用时 750 毫秒
1.
将缩减生成器与一种新型的钟控生成器组合构成了一种新型的伪随机序列生成器—缩控生成器,它是由两个三元的线性反馈移位寄存器(LFSR)构成。文章讨论了这种新型的缩控序列的周期,线性复杂度,符号分布及1,2-重量复杂度等密码学性质。分析结果表明,这种缩控序列具有大的周期,大的线性复杂度,符号分布也比较均衡,而且当LFSR级数很大时,缩控序列能够有效地抵抗B-M算法的攻击,适合于流密码系统中的应用。 相似文献
2.
论文基于三元伪随机序列,将钟控生成器和缩减生成器结合进行二维输出,构成一种新型伪随机序列生成器—二维缩控生成器,由其生成的二维缩控序列具有大周期和高线性复杂度,能够抵抗诸如B-M算法等综合算法攻击,且证明了序列游程长度为1或2,数据率为8/9,符号分布基本平衡等性质。因此,二维缩控生成器适合在流密码系统中应用。 相似文献
3.
基于钟控、缩减生成器的构造思想,结合个别元素控制扩大输出的方式构造了一种新型伪随机序列生成器—扩散输出生成器。分析得到其生成序列—扩散输出序列的周期、线性复杂度及游程分布。文中进一步改变扩散输出组,得到一组伪随机序列,分析得到相应序列的周期和线性复杂度,实现对扩散输出生成器的拓展. 相似文献
4.
A5算法是一种利用伪随机数和非线性运算实现的流密码,它是求和生成器和钟控移位寄存器的组合,其线性复杂度大于两种生成器线性复杂度,加密速度快,适合无线突发信道。 相似文献
5.
提出了一种新的钟控密钥流生成器,由3个移位寄存器组成:两个被钟控的线性反馈移位寄存器A和B,一个提供钟控信息的非线性反馈移位寄存器C。设A、B和C的长度分别为l1、l2和l3。移位寄存器A和B的钟控信息由从移位寄存器C选取的两个比特串提供,移位的次数分别是两个比特串的汉明重量。研究了该生成器的周期、线性复杂度和k错线性复杂度,分析了这种密钥流生成器的安全性。 相似文献
6.
本文引进LSR_g[d,k]—互钟控序列模型,作为文献[1]中下标序列的具体实现,讨论了LSR_g[d,k]—互钟控序列的极小多项式,周期和线性复杂度等特点,给出了一批周期大,线性复杂度高的二元序列。 相似文献
7.
8.
9.
10.
本文利用m-序列和前馈序列的特性提出了一种新的生成器。这种生成器所生成的序列具有大的周期和线性复杂度,并且具有良好的伪随机特性。 相似文献
11.
Liu Xian Xiao Guozhen 《Electronics letters》1992,28(8):709-710
A new type of cascaded clock-controlled system is proposed. There are r+1 linear feedback shift registers (LFSRs) of length n in the system if the degree of cascade connection is r. It is proved that for an rth degree cascade the output sequences have linear complexity n Sigma /sub i=0//sup r/ (2/sup n/-1)/sup i/, period (2/sup n/-1)/sup r+1/ and good statistical properties. Such a model can generate key stream sequences of stream ciphers in computer applications.<> 相似文献
12.
多值“加法型”组合生成器分析 总被引:1,自引:1,他引:0
文中运用信息论原理对多值“加法型”组合生成器序列进行分析,得到钟控序列与输出序列的互信息为零的结论,证明了钟控输入与输出序列之间互信息是输出序列长度的严格递增函数,进而对控选逻辑序列设计进行分析。 相似文献
13.
On the linear complexity of nonlinearly filtered PN-sequences 总被引:1,自引:0,他引:1
Kolokotronis N. Kalouptsidis N. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2003,49(11):3047-3059
Binary sequences of period 2/sup n/-1 generated by a linear feedback shift register (LFSR) whose stages are filtered by a nonlinear function, f, are studied. New iterative formulas are derived for the calculation of the linear complexity of the output sequences. It is shown that these tools provide an efficient mechanism for controlling the linear complexity of the nonlinearly filtered maximal-length sequences. 相似文献
14.
Golic J.D. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2001,47(3):1032-1041
A theoretical framework for correlation attacks based on edit distances and edit probabilities on binary keystream generators consisting of clock-controlled shift registers combined by a function with memory is introduced. Recursive algorithms for efficient computation of the proposed many-to-one string edit distances and statistically optimal edit probabilities are derived for both constrained and unconstrained irregular clocking. The distances and probabilities are based on mutually correlated linear transforms of input and output sequences in the corresponding regularly clocked combiner with memory. Linear transforms can also incorporate linear models of clock-controlled shift registers. The complexity of the recursive algorithms is exponential in the memory size of the input linear transform which can be considerably smaller than the memory size of combining function. This is demonstrated for a special type of combiners with memory based on a time-varying memoryless function. In addition, a decimation method for reducing the memory size of the input linear transform is proposed. The design criteria with respect to the introduced correlation attacks are also discussed 相似文献
15.
16.
Computing the error linear complexity spectrum of a binary sequence of period 2/sup n/ 总被引:1,自引:0,他引:1
Lauder A.G.B. Paterson K.G. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2003,49(1):273-280
Binary sequences with high linear complexity are of interest in cryptography. The linear complexity should remain high even when a small number of changes are made to the sequence. The error linear complexity spectrum of a sequence reveals how the linear complexity of the sequence varies as an increasing number of the bits of the sequence are changed. We present an algorithm which computes the error linear complexity for binary sequences of period /spl lscr/=2/sup n/ using O(/spl lscr/(log/spl lscr/)/sup 2/) bit operations. The algorithm generalizes both the Games-Chan (1983) and Stamp-Martin (1993) algorithms, which compute the linear complexity and the k-error linear complexity of a binary sequence of period /spl lscr/=2/sup n/, respectively. We also discuss an application of an extension of our algorithm to decoding a class of linear subcodes of Reed-Muller codes. 相似文献
17.
Self-Shrinking Control (SSC) sequences are a class of important pseudo-random sequences, and pseudo-random sequences are widely used in many fields, such as communication encryption, recoding technology. In these applications, sequences are usually required to have large periods and high linear complexity. In order to construct pseudo-random sequences with higher period and higher linear complexity, a new SSC sequence model based on the m-sequence in GF (3) is constructed, the period and the linear complexity of the generated sequence are studied by using finite domain theory, this model greatly improves the period and the linear complexity of the generated sequence, and obtains a more accurate upper bound value of the linear complexity of the generated sequence. Thus, the anti-attack ability and security performance of the generated sequence in communication encryption are improved. 相似文献
18.
ANALYSIS OF THE MUTUAL INFORMATION BETWEEN INPUT AND OUTPUT OF A CLASS OF CLOCK-CONTROLLED SEQUENCES 总被引:3,自引:0,他引:3
Fan Xiubin Li Shiqu 《电子科学学刊(英文版)》2000,17(2):185-192
In this paper, the mutual information between clock-controlled input and output sequences is discussed. It is proved that the mutual information is a strictly monotone increasing function of the length of output sequence, and its divergent rate is gaven. 相似文献
19.
随机周期序列☆错线性复杂度的期望上界 总被引:2,自引:0,他引:2
周期序列的k错线性复杂度是衡量流密码系统的安全性能的一个重要指标。本文给出了周期序列k错线性复杂度上界的一个更强的结果,从而给出了几种不同情形下随机周期序列k错线性复杂度的期望的上界。特别地,还给出了周期N=pv,随机周期序列满足一定条件时1错线性复杂度的期望更紧的结果。 相似文献