F-GSS: A Novel FCSR-Based Keystream Generator

A novel FCSR-based generalized self-shrinking stream sequence generator (called F-GSS) has been proposed. The F-GSS keystream generator has passed the NIST's statistical test suite, which shows that F-GSS has good pseudo-random properties, and the ESTREAM's test suite, which shows the efficiency of F-GSS, in terms of high encryption rate for long streams, high encryption rate for different packets, good agility, and low cost for key and IV setup. The hardware simulation test also shows the efficiency of F-GSS, in terms of low hardware overhead and high throughput. The security analysis shows that the F-GSS generator can resist the current available attacks including the most serious attack on the F-FCSR generators.

[1]  Mark Goresky,et al.  2-Adic Shift Registers , 1993, FSE.

[2]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[3]  Guozhen Xiao,et al.  Generalized self-shrinking generator , 2004, IEEE Trans. Inf. Theory.

[4]  Mark Goresky,et al.  Fibonacci and Galois representations of feedback-with-carry shift registers , 2002, IEEE Trans. Inf. Theory.

[5]  Borislav Bedzhev,et al.  N-adic Summation-Shrinking Generator. Basic properties and empirical evidences , 2005, IACR Cryptol. ePrint Arch..

[6]  P. P. Deepthi,et al.  Design and analysis of a highly secure stream cipher based on linear feedback shift register , 2009, Comput. Electr. Eng..

[7]  François Arnault,et al.  F-FCSR: Design of a New Class of Stream Ciphers , 2005, FSE.

[8]  Mark Goresky,et al.  Cryptanalysis Based on 2-Adic Rational Approximation , 1995, CRYPTO.

[9]  Willi Meier,et al.  Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.

[10]  Ko-ming Chiu,et al.  The Cryptanalysis of LFSR/FCSR Based Alternating Step Generator , 2006, 2006 International Conference on Computer Engineering and Systems.

[11]  Jovan Dj. Golic,et al.  On the Security of Shift Register Based Keystream Generators , 1993, FSE.

[12]  Thomas Siegenthaler,et al.  Correlation-immunity of nonlinear combining functions for cryptographic applications , 1984, IEEE Trans. Inf. Theory.

[13]  Hu Yu Generalized self shrinking sequences on GF( q ) , 2001 .

[14]  Martin Hell,et al.  Breaking the F-FCSR-H Stream Cipher in Real Time , 2008, ASIACRYPT.

[15]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[16]  Ihor Vasyltsov,et al.  Investigations of the basic component of FCSR-generator , 2003, Second IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications, 2003. Proceedings.

[17]  Borislav Stoyanov,et al.  IMPROVED CRYPTOANALYSIS OF THE SELF-SHRINKING P-ADIC CRYPTOGRAPHIC GENERATOR , 2008 .