A Transformation From the Fibonacci to the Galois NLFSRs

Conventional nonlinear feedback shift registers (NLFSRs) use the Fibonacci configuration in which the feedback is applied to the last bit only. In this paper, we show how to transform a Fibonacci NLFSR into an equivalent NLFSR in the Galois configuration, in which the feedback can be applied to every bit. Such a transformation can potentially reduce the depth of the circuits implementing feedback functions, thus decreasing the propagation time and increasing the throughput.

[1]  Johannes Mykkeltveit,et al.  On the Cycle Structure of Some Nonlinear Shift Register Sequences , 1979, Inf. Control..

[2]  Johannes Mykkeltveit Nonlinear Recurrences and Arithmetic Codes , 1977, Inf. Control..

[3]  Avishai Wool,et al.  Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's , 2006, ISC.

[4]  Stelvio Cimato,et al.  Encyclopedia of Cryptography and Security , 2005 .

[5]  Fred S. Annexstein Generating De Bruijn Sequences: An Efficient Implementation , 1997, IEEE Trans. Computers.

[6]  James L. Massey,et al.  Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.

[7]  Anne Canteaut,et al.  Open Problems Related to Algebraic Attacks on Stream Ciphers , 2005, WCC.

[8]  Mark Goresky,et al.  Fibonacci and Galois representations of feedback-with-carry shift registers , 2002, IEEE Trans. Inf. Theory.

[9]  Alexander Maximov,et al.  Some Words on Cryptanalysis of Stream Ciphers , 2006 .

[10]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[11]  Willi Meier,et al.  Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.

[12]  Jovan Dj. Golic,et al.  On the linear complexity of functions of periodic GF(q) sequences , 1989, IEEE Trans. Inf. Theory.

[13]  Bruce Schneier,et al.  Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .

[14]  Chung-Huang Yang,et al.  Pseudorandom bit generators in stream-cipher cryptography , 1991, Computer.

[15]  Hannu Tenhunen,et al.  On Analysis and Synthesis of (n,k)-Non-Linear Feedback Shift Registers , 2008, 2008 Design, Automation and Test in Europe.

[16]  Nicholas Kalouptsidis,et al.  Synthesis of minimal cost nonlinear feedback shift registers , 2002, 2002 11th European Signal Processing Conference.

[17]  Rainer Göttfert,et al.  An NLFSR-based stream cipher , 2006, 2006 IEEE International Symposium on Circuits and Systems.

[18]  Fred Piper,et al.  Stream Ciphers , 1982, EUROCRYPT.

[19]  H. Fredricksen A Survey of Full Length Nonlinear Shift Register Cycle Algorithms , 1982 .

[20]  Hu Chuan-Gan,et al.  On The Shift Register Sequences , 2004 .

[21]  Bernhard Löhlein Attacks based on Conditional Correlations against the Nonlinear Filter Generator , 2003, IACR Cryptol. ePrint Arch..

[22]  Rafal Bialota,et al.  Modified Alternating $$\vec{k}$$–generators , 2005, Des. Codes Cryptogr..

[23]  Martin Hell,et al.  Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..

[24]  William Millan,et al.  Dragon: A Fast Word Based Stream Cipher , 2004, ICISC.

[25]  Oliver Kniffler,et al.  Achterbahn-128 / 80 : Design and Analysis , 2007 .

[26]  Yuriy Tarannikov New Constructions of Resilient Boolean Functions with Maximal Nonlinearity , 2001, FSE.

[27]  Grzegorz Kawa Modified Alternating k-generators , 2005 .

[28]  Benjamin Gittins,et al.  A Presentation on VEST Hardware Performance, Chip Area Measurements, Power Consumption Estimates and Benchmarking in Relation to the AES, SHA-256 and SHA-512 , 2005, IACR Cryptol. ePrint Arch..

[29]  Michael Luby,et al.  Pseudorandomness and cryptographic applications , 1996, Princeton computer science notes.

[30]  J. Stokłosa,et al.  Boolean feedback functions for full-length nonlinear shift registers , 2004 .

[31]  C.J.A. Jansen,et al.  Investigations on nonlinear streamcipher systems: construction and evaluation methods , 1989 .

[32]  M. J. Al-Mushrafi,et al.  Design and study of a strong crypto-system model for e-Commerce , 2002 .

[33]  Eli Biham,et al.  Cryptanalysis of the A5/1 GSM Stream Cipher , 2000, INDOCRYPT.