Paper 2014/951

Modified Alternating Step Generators with Non-Linear Scrambler

Robert Wicik, Tomasz Rachwalik, and Rafał Gliwa

Abstract

Pseudorandom generators, which produce keystreams for stream ciphers by the exclusive-or sum of output bits from alternately clocked linear feedback shift registers, are vulnerable to cryptanalysis. In order to increase their resistance to attacks, we introduce a nonlinear scrambler at the output of these generators. The role of the scrambler plays the nonlinear feedback shift register. In addition, we propose the Modified Alternating Step Generator (MASG1S) built with the nonlinear scrambler and regularly or irregularly clocked linear feedback shift registers with nonlinear filtering functions.

Note: Continuation of the work described in the publication: eprint.iacr.org/2013/728

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Minor revision. Annales UMCS Informatica AI XIV, 1 (2014) 61-74
DOI
10.2478/umcsinfo-2014-0003
Keywords
stream ciphersalternating step generatorslinearnonlinear feedback shift registers
Contact author(s)
r wicik @ wil waw pl
History
2014-11-20: received
Short URL
https://ia.cr/2014/951
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2014/951,
      author = {Robert Wicik and Tomasz Rachwalik and Rafał Gliwa},
      title = {Modified Alternating Step Generators with Non-Linear Scrambler},
      howpublished = {Cryptology {ePrint} Archive, Paper 2014/951},
      year = {2014},
      doi = {10.2478/umcsinfo-2014-0003},
      url = {https://eprint.iacr.org/2014/951}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.