Skip to main content

Novel Analysis of Stream Cipher Combing LFSR and FCSR

  • Conference paper
  • First Online:
Frontiers in Cyber Security (FCS 2018)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 879))

Included in the following conference series:

Abstract

At Indocrypt’2002, a new pseudorandom generator based on linear feedback shift register (LFSR) and feedback with carry shift registers (FCSR) was proposed by Arnault. And at Indocrypt’2004, Bin Zhang et al. showed that the self-synchronizing stream cipher constructed by Arnault’s pseudorandom generator was extremely weak against a chosen ciphertext attack. In this paper, we show that the synchronizing stream cipher constructed by Arnault’s pseudorandom generator bear good immunities to the attack proposed by Bin Zhang et al., but can not resist the LFSRization attack proposed by Martin Hell and Thomas Johansson. Then we propose a modification to the synchronizing stream cipher, and show that it inherits of the nice statistical properties of the pseudorandom generator and provided a resistant to the known attacks. The new architecture still has high throughput and low implementation cost.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shyrochin, V.P., Vasyltsov, I.V., Karpinskij, B.Z.: Investigations of the basic component of FCSR-generator. In: Proceedings of the Second IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, pp. 132–135. IEEE (2003)

    Google Scholar 

  2. Golić, J.D.: On the security of shift register based keystream generators. In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 90–100. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-58108-1_12

    Chapter  Google Scholar 

  3. Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, Heidelberg (1986). https://doi.org/10.1007/978-3-642-82865-2

    Book  MATH  Google Scholar 

  4. Arnault, F., Berger, T.P., Necer, A.: A new class of stream ciphers combining LFSR and FCSR architectures. In: Menezes, A., Sarkar, P. (eds.) INDOCRYPT 2002. LNCS, vol. 2551, pp. 22–33. Springer, Heidelberg (2002). https://doi.org/10.1007/3-540-36231-2_3

    Chapter  Google Scholar 

  5. Zhang, B., Wu, H., Feng, D., Bao, F.: Chosen ciphertext attack on a new class of self-synchronizing stream ciphers. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 73–83. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30556-9_7

    Chapter  Google Scholar 

  6. Hell, M., Johansson, T.: Breaking the F-FCSR-H stream cipher in real time. In: Pieprzyk, J. (ed.) ASIACRYPT 2008. LNCS, vol. 5350, pp. 557–569. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-89255-7_34

    Chapter  MATH  Google Scholar 

  7. Arnault, F., Berger, T., Lauradoux, C., Minier, M., Pousse, B.: A new approach for FCSRs. In: Jacobson, M.J., Rijmen, V., Safavi-Naini, R. (eds.) SAC 2009. LNCS, vol. 5867, pp. 433–448. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-05445-7_27

    Chapter  Google Scholar 

  8. Allailou, B., Marjane, A., Mokrane, A.: Design of a novel pseudo-random generator based on vectorial FCSRs. In: Chung, Y., Yung, M. (eds.) WISA 2010. LNCS, vol. 6513, pp. 76–91. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-17955-6_6

    Chapter  Google Scholar 

  9. Klapper, A., Goresky, M.: 2-Adic shift registers. In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 174–178. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-58108-1_21

    Chapter  Google Scholar 

  10. Klapper, A., Goresky, M.: Feedback shift registers, 2-Adic span, and combiners with memory. J. Cryptol. 10(2), 111–147 (1997)

    Article  MathSciNet  Google Scholar 

  11. Klapper, A., Goresky, M.: Fibonacci and galois representations of feedback-with-carry shift registers. IEEE Trans. Inf. Theory 48(11), 2826–2836 (2002)

    Article  MathSciNet  Google Scholar 

  12. Arnault, F., Berger, T.P.: Design and properties of a new pseudo-random generator based on a filtered FCSR automaton. IEEE Trans. Comput. 54(11), 1374–1383 (2005)

    Article  Google Scholar 

  13. The eSTREAM Project. http://www.ecrypt.eu.org/stream/endofphase3.html

  14. Song, H., Fan, X., Wu, C., Feng, D.: On the probability distribution of the carry cells of stream ciphers F-FCSR-H v2 and F-FCSR-H v3. In: Wu, C.-K., Yung, M., Lin, D. (eds.) Inscrypt 2011. LNCS, vol. 7537, pp. 160–178. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34704-7_13

    Chapter  Google Scholar 

  15. Arnault, F., Berger, T.P., Pousse, B.: A matrix approach for FCSR automata. Cryptogr. Commun. 3(2), 109–139 (2011)

    Article  MathSciNet  Google Scholar 

  16. Lin, Z., Pei, D., Lin, D., et al: Fast construction of binary ring FCSRs for hardware stream ciphers. Designs Codes Cryptography, (2), 1–15 (2017)

    Google Scholar 

  17. Pei, D., Lin, Z., Zhang, X.: Construction of transition matrices for ternary ring feedback with carry shift registers. IEEE Trans. Inf. Theory 61(5), 2942–2951 (2015)

    Article  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lihua Dong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dong, L., Wang, J., Zhang, S. (2018). Novel Analysis of Stream Cipher Combing LFSR and FCSR. In: Li, F., Takagi, T., Xu, C., Zhang, X. (eds) Frontiers in Cyber Security. FCS 2018. Communications in Computer and Information Science, vol 879. Springer, Singapore. https://doi.org/10.1007/978-981-13-3095-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-3095-7_3

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-3094-0

  • Online ISBN: 978-981-13-3095-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics