Further Results on Multiples of Primitive Polynomials and Their Products over GF(2)

Recently the problem of analysing the multiples of primitive polynomials and their products has received a lot of attention. These primitive polynomials are basically the connection polynomials of the LFSRs (Linear Feedback Shift Registers) used in the stream cipher system. Analysis of sparse multiples of a primitive polynomial or product of primitive polynomials helps in identifying the robustness of the stream ciphers based on nonlinear combiner model. In this paper we first prove some important results related to the degree of the multiples. Earlier these results were only observed for small examples. Proving these results clearly identify the statistical behavior related to the degree of multiples of primitive polynomials or their products. Further we discuss a randomized algorithm for finding sparse multiples of primitive polynomials and their products. Our results clearly identify the time memory trade off for finding such multiples.

[1]  K Jambunathan On Choice of Connection-Polynominals for LFSR-Based Stream Ciphers , 2000, INDOCRYPT.

[2]  Harald Niederreiter,et al.  Introduction to finite fields and their applications: List of Symbols , 1986 .

[3]  F. MacWilliams,et al.  The Theory of Error-Correcting Codes , 1977 .

[4]  Subhamoy Maitra,et al.  Primitive Polynomials over GF(2) - A Cryptologic Approach , 2001, ICICS.

[5]  Solomon W. Golomb,et al.  Shift Register Sequences , 1981 .

[6]  Gareth Jones,et al.  Elementary number theory , 2019, The Student Mathematical Library.

[7]  Thomas Siegenthaler,et al.  Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.

[8]  Thomas Siegenthaler,et al.  Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.

[9]  Mihir Bellare Advances in Cryptology — CRYPTO 2000 , 2000, Lecture Notes in Computer Science.

[10]  Subhamoy Maitra,et al.  Multiples of Primitive Polynomials over GF(2) , 2001, INDOCRYPT.

[11]  Ayineedi Venkateswarlu,et al.  Multiples of Primitive Polynomials and Their Products over GF(2) , 2002, Selected Areas in Cryptography.

[12]  Thomas Johansson,et al.  Fast Correlation Attacks through Reconstruction of Linear Polynomials , 2000, CRYPTO.

[13]  Anne Canteaut,et al.  Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5 , 2000, EUROCRYPT.

[14]  Cunsheng Ding,et al.  The Stability Theory of Stream Ciphers , 1991, Lecture Notes in Computer Science.

[15]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .