New application methods for word-oriented cryptographic primitives
New application methods for word-oriented cryptographic primitives作者机构:Zhengzhou Information Science and Technology Institute Zhengzhou China State Key Laboratory of Information Security Institute of Software Chinese Academy of Sciences Beijing China
出 版 物:《Science China(Information Sciences)》 (中国科学:信息科学(英文版))
年 卷 期:2012年第55卷第9期
页 面:2149-2160页
核心收录:
学科分类:11[军事学] 1105[军事学-军队指挥学] 0839[工学-网络空间安全] 08[工学] 110505[军事学-密码学] 110503[军事学-军事通信学]
基 金:supported by National Natural Science Foundation of China (Grant No. 61003291) National High Technology Research and Development Program of China (Grant No. 2011AA010803) Foundation for the Author of National Excellent Doctoral Dissertation of China (Grant No. FANEDD-2007B74)
主 题:stream cipher single cycle T-function linear complexity k-error linear complexity
摘 要:Modern software oriented symmetric ciphers have become a key feature in utilizing word-oriented cryptographic *** the output sequence,in the order of its generation,of a word-oriented cryptographic primitive in the same way as traditional bit-oriented primitives,we can expose the intrinsic weakness of these primitives,especially for word-oriented linear feedback shift registers,T-functions,and so *** new methods for using word-oriented cryptographic primitives are presented in this paper,that is,the extracted state method and cascading extracted coordinate *** a T-function as an example,we research the different cryptographic properties of the output sequences of the original method and the two proposed methods,focusing mainly on period,linear complexity,and k-error linear *** conclusions show that the proposed methods could enhance at low cost the cryptographic properties of the output *** a result,since the new methods are simple and easy to implement,they could be used to design new word-oriented cryptographic primitives.