Skip to main content

On the Cryptanalysis of Nonlinear Sequences [Invited Paper]

  • Conference paper
  • First Online:
Cryptography and Coding (Cryptography and Coding 1999)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1746))

Included in the following conference series:

Abstract

A nonlinear boolean function f(x1; x2; : : : ; xk) of k binary variables may be used in two basically different ways to generate a non-linear binary sequence, internally or externally. Internally, f may be part of the feedback computation of a nonlinear feedback shift register. Externally, f may be applied to the output bit stream of another sequence generator (e.g. a linear shift register) to introduce nonlinearity, or greater nonlinearity. A third approach is to use f to obtain a nonlinear combination of k linear sequences. The vulnerability of systems using f in any of these ways to cryptanalysis depends on the multidimensional correlations of f with the modulo 2 sums of the subsets of its variables. This principle was published by the present author in [1] in 1959, and included as Chapter 8 in his book [2] in 1967. It was subsequently rediscovered and republished in 1988 in [3], on the basis of which it is sometimes known as the Xiao-Massey algorithm. Some practical aspects of the use of this principle in code construction as well as code breaking, and for other types of signal design, are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Golomb, S.W.: On the Classification of Boolean Functions. Transactions of the International Symposium on Circuit and Information Theory: IRE Transactions on Circuit Theory. CT-6 (1959) 176–186; IRE Transactions on Information Theory. IT-5 (1959) 176-186.

    Article  Google Scholar 

  2. Golomb, S.W.: Shift Register Sequences. Holden-Day, Inc., San Francisco (1967).

    MATH  Google Scholar 

  3. Xiao, G.-Z., Massey, J.L.: A spectral characterization of correlation-immune combining functions. IEEE Trans. on Information Theory, IT-34,no. 3 (1988) 569–571.

    Article  MathSciNet  Google Scholar 

  4. Slepian, D.: On the number of symmetry types of boolean functions of n variables, Can. J. Math. 5,no. 2 (1953) 185–193.

    Article  MathSciNet  Google Scholar 

  5. Golomb, S.W., ed.: Digital Communications with Space Applications. Prentice-Hall, Englewood Cliffs, NJ (1964).

    MATH  Google Scholar 

  6. Siegenthaler, T., Decrypting a Class of Stream Ciphers Using Ciphertext Only. IEEE Trans. on Computers, C-34 (1985) 81–85.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 1999 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Golomb, S.W. (1999). On the Cryptanalysis of Nonlinear Sequences [Invited Paper]. In: Walker, M. (eds) Cryptography and Coding. Cryptography and Coding 1999. Lecture Notes in Computer Science, vol 1746. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-46665-7_27

Download citation

  • DOI: https://doi.org/10.1007/3-540-46665-7_27

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-66887-9

  • Online ISBN: 978-3-540-46665-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics