Security Evaluation of Nonlinear Filterization Stream Cipher Based on Information Theory | ||
Journal of University of Babylon | ||
Article 1, Volume 22, Issue 7, September 2014, Pages 1862-1870 | ||
Authors | ||
Dhilal M. Reza; Sattar B. Sadkhan | ||
Abstract | ||
One of the techniques for destroying the linearity inherent in LFSRs is to generate the keystream as a result of some nonlinear function of the stages of a single LFSR. Such keystream generators are called nonlinear filter generators, and the used nonlinear function is called the filtering function. We have proposed a new method to evaluate the nonlinear filtering function which is based on five parameters (length of register, seed, connection polynomial, filter structure, chosen entrances). To built the nonlinear function , the designer needs to built it in the program and change part of the chosen nonlinear function every time and see the results. We shorten this operation for the designer to write only one equation and the new method will generate all the possible forms for the input equation, and then analyzes the output sequence resulted from each state using frequency and serial tests to determine the best filter function and consequently we knew the probability distribution of the resulted key Based on the Information Theory, security evaluation of nonlinear filtering stream cipher was computed. | ||
Keywords | ||
Security Evaluation; stream cipher; nonlinear Filterization | ||
Statistics Article View: 72 PDF Download: 49 |