skip to main content
10.1145/1128817.1128858acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
Article

Periodicity, complementarity and complexity of 2-adic FCSR combiner generators

Published:21 March 2006Publication History

ABSTRACT

Feedback-with-carry shift registers (FCSRs) are nonlinear analogues of linear feedback shift registers (LFSRs). Like the LFSRs, FCSRs are easy to implement and are important primitives in stream cipher design and pseudorandom number generation. In this paper, we investigate the properties of combiner generators that use two 2-adic feedback-with-carry shift registers as primitives. The combining function is simply the XOR function. This choice is motivated by an observation of Arnault and Berger on the high nonlinearity of the FCSR and that of Siegenthaler on the trade-off between resilience and correlation immunity of boolean functions. When the two FCSRs have odd prime power connection integers with 2 as a primitive root, we determine the exact period of the output sequence. We also prove that if the prime factors of the connection integers of the two FCSRs belong to different equivalence classes modulo 4, then the output sequence is symmetrically complementary. We use this fact to derive upper bounds on the linear complexity and the 2-adic complexity of the output sequence of the FCSR-combiner.

References

  1. F. Arnault and T.-P. Berger. Design of new pseudorandom generators based on a filtered fcsr automaton. In Proceedings of the SASC Workshop, pages 109--120, October 2004.Google ScholarGoogle Scholar
  2. F. Arnault and T.-P. Berger. F-FCSR: Design of a new class of stream ciphers. In H. Gilbert and H. Handschuh, editors, 12th. International Workshop, Fast Software Encryption 2005, Paris, France. Lecture Notes in Computer Science 3557, pages 83--97. Springer, February 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. F. Arnault, T.-P. Berger, and A. Necer. A new class of stream ciphers combining LFSR and FCSR architectures. In A. Menezes and P. Sarkar, editors, Progress in Cryptology -- INDOCRYPT 2002, Lecture Notes in Computer Science, volume 2551, pages 22--33. Springer, New York, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. H. Beker and F. Piper. Cipher Systems. John Wiley, 1982.Google ScholarGoogle Scholar
  5. R. Couture and P. L'Ecuyer. Distribution properties of multiply-with-carry random number generators. Mathematics of Computation, 66:591--607, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. M. M. de Weger. Approximation lattices of p-adic numbers. Journal of Number Theory, 24:70--88, 1986.Google ScholarGoogle ScholarCross RefCross Ref
  7. C. F. Gauß. Disquisitiones Arithmeticæ. (Reprinted English translation, Yale University Press, New Haven, 1966), 1801.Google ScholarGoogle Scholar
  8. S. W. Golomb. Shift Register Sequences. Holden-Day, San Francisco, 1967. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M. Goresky and A. Klapper. Large period nearly de Bruijn FCSR sequences. In Advances in Cryptology -- EUROCRYPT'95, Lecture Notes in Computer Science, volume 921, pages 263--273. Springer, New York, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. F. Gouvěa. p-adic Numbers: An Introduction. Springer--Verlag, 2nd. edition, 2003.Google ScholarGoogle Scholar
  11. G. H. Hardy and E. M. Wright. An Introduction to the Theory of Numbers. Oxford University Press, 5th edition, 1979.Google ScholarGoogle Scholar
  12. A. Klapper and M. Goresky. 2-adic shift registers. In Fast Software Encryption, Cambridge Security Workshop, Lecture Notes in Computer Science, volume 809. Springer--Verlag, December 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Klapper and M. Goresky. Feedback shift registers, 2-adic span and combiners with memory. Journal of Cryptology, 10:111--147, 1997.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. N. Koblitz. p-adic Numbers, p-adic Analysis, and Zeta Functions. Springer--Verlag, New York, GTM Vol. 58 edition, 1984.Google ScholarGoogle Scholar
  15. K. Mahler. Introduction to p-adic Numbers and their Functions. Cambridge University Press, 1973.Google ScholarGoogle Scholar
  16. G. Marsaglia. yet another rng. Posted to the Usenet newsgroup sci.stat.math, August 1, 1994.Google ScholarGoogle Scholar
  17. J. L. Massey. Shift-register synthesis and BCH decoding. IEEE Transactions on Information Theory, IT-15:122--127, January 1969.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Mittelbach and A. Finger. Investigation of FCSR-based pseudorandom sequence generators for stream ciphers. In Proceedings of the 3rd. International Conference on Networking, February 2004.Google ScholarGoogle Scholar
  19. R. A. Rueppel. Analysis and Design of Stream Ciphers. Springer--Verlag, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. B. Schneier. Applied Cryptography. John Wiley & Sons, 2nd edition, 1996.Google ScholarGoogle Scholar
  21. T. Siegenthaler. Correlation immunity of nonlinear combining functions for cryptographic applications. IEEE Transactions on Information Theory, IT-30:776--780, 1984.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Z. Tasheva, B. Bedzhev, and B. Stoyanov. N-adic summation shrinking generator -- basic properties and empirical evidences. Submitted to the IACR e-print archive, 2004.Google ScholarGoogle Scholar
  23. J. Xu. Stream Cipher Analysis Based on FCSRs. Ph.D. dissertation, University of Kentucky, Lexington, Kentucky, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Periodicity, complementarity and complexity of 2-adic FCSR combiner generators

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security
              March 2006
              384 pages
              ISBN:1595932720
              DOI:10.1145/1128817

              Copyright © 2006 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 21 March 2006

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              Overall Acceptance Rate418of2,322submissions,18%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader