Skip to main content

Randomness and Representation of Span n Sequences

  • Conference paper
Sequences, Subsequences, and Consequences

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4893))

Abstract

Any span n sequences can be regarded as filtering sequences. From this observation, new randomness criteria for span n sequences are proposed. It is proved that the feedback function of a span n sequence can be represented as a composition of its trace representation, or equivalently, its discrete Fourier transform, and a permutation from the state space of the sequence to the multiplicative group of the finite field GF(2n), and vice versa. Significant enhancements for randomness of span n sequences, so that de Bruijn sequences, are illustrated by some examples.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Beker, H., Piper, F.: Cipher Systems. John Wiley and Sons, New York (1982)

    MATH  Google Scholar 

  2. Berlekamp, E.R.: Algebraic coding theory. McGraw-Hill, New York (1968)

    MATH  Google Scholar 

  3. Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2–21. Springer, Heidelberg (1991)

    Google Scholar 

  4. Chan, A.H., Games, R.A., Key, E.L.: On the complexities of de Bruijn sequences. J. Combin. Theory 33, 233–246 (1982)

    Article  MATH  MathSciNet  Google Scholar 

  5. Chabaud, F., Vaudenay, S.: Links between differential and linear cryptanalysis. In: De Santis, A. (ed.) EUROCRYPT 1994. LNCS, vol. 950, pp. 363–374. Springer, Heidelberg (1995)

    Google Scholar 

  6. Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham, E. (ed.) Advances in Cryptology – EUROCRPYT 2003. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Courtois, N.: Fast algebraic attacks on stream ciphers with linear feedback. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 176–194. Springer, Heidelberg (2003)

    Google Scholar 

  8. Ding, C., Xiao, G., Shan, W.: The Stability Theory of Stream Ciphers. LNCS, vol. 561. Springer, Heidelberg (1991)

    MATH  Google Scholar 

  9. Etzion, T., Lempel, A.: Construction of de Bruijn sequences of minimal complexity. IEEE Trans. Inform. Theory IT-30(5), 705–709 (1984)

    Article  MathSciNet  Google Scholar 

  10. eSTREAM - The ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream

  11. Goldreich, O.: Foundations of Cryptography: Basic Applications. Cambridge University Press, Cambridge (2004)

    MATH  Google Scholar 

  12. Golomb, S.W.: Shift Register Sequences. Holden-Day, Inc., San Francisco (1967); revised edition, Aegean Park Press, Laguna Hills, CA (1982)

    MATH  Google Scholar 

  13. Golomb, S.W.: On the classification of balanced binary sequences of period 2n − 1. IEEE Trans. on Inform. Theory IT-26(6), 730–732 (1980)

    Article  MathSciNet  Google Scholar 

  14. Golomb, S.W.: Irreducible polynomials, synchronization codes, primitive necklaces, and the cyclotomic algebra. In: Bose, R.C., Dowling, T.A. (eds.) Combinatorial Mathematics and its Applications, pp. 358–370. University of North Carolina Press, Chapel Hill (1969)

    Google Scholar 

  15. Golomb, S.W., Gong, G.: Signal Design with Good Correlation: for Wireless Communications, Cryptography and Radar Applications. Cambridge University Press, Cambridge (2005)

    Google Scholar 

  16. National Institute of Standards and Technology, Digital Signature Standard (DSS), Federal Information Processing Standards Publication, FIPS PUB 186-2, Reaffirmed (January 27, 2000)

    Google Scholar 

  17. Mayhew, G.L., Golomb, S.W.: Linear spans of modified de Bruijn sequences. IEEE Trans. Inform. Theory IT-36(5), 1166–1167 (1990)

    Article  Google Scholar 

  18. Massey, J.L.: Shift-register synthesis and BCH decoding. IEEE Trans. on Inform. Theory 15(1), 81–92 (1969)

    Article  MathSciNet  Google Scholar 

  19. Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)

    Chapter  Google Scholar 

  20. Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton, USA (1996)

    Google Scholar 

  21. Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, Heidelberg (1986)

    MATH  Google Scholar 

  22. Shannon, C.E.: Communication Theory of Secrecy Systems. Bell System Technical Journal XXVII (4), 656–715 (1949)

    MathSciNet  Google Scholar 

  23. Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Inform. Theory 30(5), 776–780 (1984)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Solomon W. Golomb Guang Gong Tor Helleseth Hong-Yeop Song

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Gong, G. (2007). Randomness and Representation of Span n Sequences. In: Golomb, S.W., Gong, G., Helleseth, T., Song, HY. (eds) Sequences, Subsequences, and Consequences. Lecture Notes in Computer Science, vol 4893. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-77404-4_19

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-77404-4_19

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-77403-7

  • Online ISBN: 978-3-540-77404-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics