Receive a 20% Discount on All Purchases Directly Through IGI Global's Online Bookstore

Chungath Srinivasan (Amrita Vishwa Vidyapeetham, India), K.V. Lakshmy (Amrita Vishwa Vidyapeetham, India) and M. Sethumadhavan (Amrita Vishwa Vidyapeetham, India)

Copyright: © 2011
|Pages: 11

DOI: 10.4018/978-1-60960-123-2.ch015

Chapter Preview

TopIn stream cipher cryptography a pseudorandom sequence of bits of length equal to the message length is generated. This sequence is then bitwise XORed (addition modulo 2) with the message sequence and the resulting sequence is transmitted. At the receiving end, deciphering is done by generating the same pseudorandom sequence and bitwise XORing the cipher bits with the random bits. The seed of the pseudorandom bit generator is obtained from the secret key. For some recent proposals of stream ciphers refer the eSTREAM Project (The ECRYPT Stream Cipher Project). Linear (non-linear) Feedback Shift Registers (LFSRs) and Boolean functions are important building blocks for stream cipher systems. A standard model of stream cipher by Siegenthaler (1984, 1985) combines the outputs of several independent LFSR sequences using a nonlinear Boolean function to produce the keystream. Design and analysis of stream ciphers was kept confidential for a long time and was made public in the 1970's, when several research papers on the design of LFSR-based stream ciphers occurred. Cryptanalysis techniques discovered during the NESSIE and eSTREAM projects (Bernstein (Report 2008/010), The ECRYPT Stream Cipher Project) have made it possible to strengthen cipher designs to a large extent, and attacking new algorithms has become more difficult. Till the end of 1990’s there are no standards for stream ciphers and the advent of these projects standardized the design of stream ciphers (Chris & Alexander 2004, The ECRYPT Stream Cipher Project). An LFSR is essentially an elementary algorithm for generating a keystream, which has the following desirable properties:

*•*Easy to implement in hardware.

*•*Produce sequences of long and deterministic period.

*•*Produce sequences with good statistical properties.

*•*Can be readily analyzed using algebraic techniques.

In this chapter section 2 gives an insight into Boolean functions and its different forms of representations, section 3 gives details of different complexity measures that a Boolean functions has to satisfy, section 4

TopBoolean functions play a central role in preserving the security of stream ciphers and block ciphers. Let *n* be any positive integer. We denote by *B _{n}* the set of all

The unique degree of ANF for a Boolean function is called the algebraic degree of the function. The Boolean functions whose algebraic degrees do not exceed 1 are called the affine functions. The TT of an *n* variable Boolean function is the 2* ^{n}* length bit binary sequence obtained from the output of a Boolean function. There are also algorithms for getting one form of representation of Boolean functions from its other form of representation. The Trace representation of a Boolean function also plays a vital role in studying and defining these functions. The trace function

Search this Book:

Reset

Copyright © 1988-2018, IGI Global - All Rights Reserved