On determination of LFSR structures to assure more reliable and secure designs of cryptographic systems

This paper presents an algorithmic procedure for determining the cryptographic key properties and hence matching with the required complexity and strength to assure a more reliable and secure designs of cryptographic systems. The designed algorithm is capable to provide the cryptographic key structure based on optimum solution approach. Using the Hardware Description Language (HDL), Verilog, the key can be realized on Field Programmable Gate Array (FPGA) platform and then translated into Printed Circuit Board (PCB).

[1]  M. J. Al-Mushrafi,et al.  Design and study of a strong crypto-system model for e-Commerce , 2002 .

[2]  Vera Pless,et al.  Encryption Schemes for Computer Confidentiality , 1977, IEEE Transactions on Computers.

[3]  N. K. Nanda,et al.  Shift register modification for multipurpose use in combinational circuit testing , 1989 .

[4]  Afaq Ahmad Development of State Model Theory for External Exclusive NOR Type LFSR Structures , 2007 .

[5]  Afaq Ahmad,et al.  Constant error masking behavior of an internal exclusive-OR type signature analyzer due to the changed polynomial seeds , 2002, Comput. Electr. Eng..

[6]  Afaq Ahmad,et al.  Design of a Realistic Test Simulator For a Built-In Self Test Environment , 2010 .

[7]  Afaq Ahmad Investigation of some quite interesting divisibility situations in a signature analyzer implementation , 2011 .

[8]  A. Ahmad,et al.  On locking conditions in m-sequence generators for the use in digital watermarking , 2009, 2009 Proceeding of International Conference on Methods and Models in Computer Science (ICM2CS).

[9]  Chi-Chun Lo,et al.  Secure communication mechanisms for GSM networks , 1999, IEEE Trans. Consumer Electron..

[10]  Ahmed Al-Maashri,et al.  Investigating some special sequence lengths generated in an external exclusive-NOR type LFSR , 2008, Comput. Electr. Eng..

[11]  Afaq Ahmad Critical role of polynomial seeds on the effectiveness of an LFSR-based testing technique , 1994 .

[12]  Chung-Huang Yang,et al.  Pseudorandom bit generators in stream-cipher cryptography , 1991, Computer.

[13]  Thomas Siegenthaler,et al.  Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.

[14]  R. A. Rueppel Analysis and Design of Stream Ciphers , 2012 .

[15]  N. K. Nanda,et al.  The use of irreducible characteristic polynomials in an LFSR based testing of digital circuits , 1989, Fourth IEEE Region 10 International Conference TENCON.

[16]  Parimal Pal Chaudhuri,et al.  Theory and Applications of Cellular Automata in Cryptography , 1994, IEEE Trans. Computers.

[17]  Afaq Ahmad,et al.  An efficient method to determine linear feedback connections in shift registers that generate maximal length pseudo-random up and down binary sequences , 1997 .

[18]  Afaq Ahmad,et al.  STUDY AND IMPLEMENTATION OF PROPERTIES OF m-SEQUENCE IN MATLAB- SIMULINK - A PASS / FAIL TEST TOOL FOR DESIGNS OF RANDOM GENERATORS , 2001 .

[19]  Manuel Blum,et al.  A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..

[20]  Ali Al-Lawati,et al.  Realization of a Simplified Controllability Computation Procedure: a MATLAB- SIMULINK Based Tool , 2003 .

[21]  Joos Vandewalle,et al.  Chaotic versus classical stream ciphers-a comparative study , 1998, ISCAS '98. Proceedings of the 1998 IEEE International Symposium on Circuits and Systems (Cat. No.98CH36187).

[22]  S. J. Shepherd Public key stream ciphers , 1994 .

[23]  A. Ahmad,et al.  A new algorithmic procedure to test m-sequence generating feedback connections of stream cipher's LFSRs , 2001, Proceedings of IEEE Region 10 International Conference on Electrical and Electronic Technology. TENCON 2001 (Cat. No.01CH37239).

[24]  Jovan Đ. Golić Recent Advances in Stream Cipher Cryptanalysis , 1998 .

[25]  A. Ahmad,et al.  A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Test Pattern Generator and Multi-Input Shift Register (MISR) , 2010, VLSIC 2010.

[26]  Tariq Jamil,et al.  An investigation into the application of linear feedback shift registers for steganography , 2002, Proceedings IEEE SoutheastCon 2002 (Cat. No.02CH37283).

[27]  J. L. Massey,et al.  An introduction to contemporary cryptology , 1988, Proc. IEEE.

[28]  A. Ahmad Achievement of higher testability goals through the modification of shift registers in LFSR-based testing , 1997 .