An error ‐ correcting stream cipher design with state ‐ hopping architecture

A new architecture of stream cipher based on state-hopping shift registers and a pseudorandom vector generator (PRVG) is introduced. The proposed stream cipher merges secrecy coding and channel coding into one processing step. It could be either a pure cryptosystem or a secrecy-channel coding by demand. Considered as cryptography, the PRVG generates pseudo random vectors which are treated as keystreams setting up the encryption scheme. This is different from the general concept in stream ciphers, state-hopping shift registers do not generate a pseudo random sequence but act as substitutions on plaintexts. Viewed as channel coding, the state-hopping shift registers play as the ones in convolution code and the PRVG generates a sequence of pseudorandom vector to determine the Trellis diagram. If the system acts as a pure cryptosystem, the decoding scheme is exactly the inverse of the encryption scheme. When the error-correcting ability is chosen, a modified sequential decoding is proposed.

[1]  Robert J. McEliece,et al.  A public key cryptosystem based on algebraic coding theory , 1978 .

[2]  Joseph M. Kahn,et al.  Transmission of analog signals using multicarrier modulation: a combined source-channel coding approach , 1996, IEEE Trans. Commun..

[3]  T. R. N. Rao,et al.  Private-key algebraic-code encryptions , 1989, IEEE Trans. Inf. Theory.

[4]  Tzonelih Hwang,et al.  Secret Error-Correcting Codes (SECC) , 1990 .

[5]  T. R. N. Rao,et al.  Private-Key Algebraic-Coded Cryptosystems , 1986, CRYPTO.

[6]  Shu Lin,et al.  Error control coding : fundamentals and applications , 1983 .

[7]  David G. Daut,et al.  Combined Source-Channel Coding of Images Using the Block Cosine Transform , 1981, IEEE Trans. Commun..

[8]  Maja Bystrom,et al.  Combined source-channel coding schemes for video transmission over an additive white Gaussian noise channel , 2000, IEEE Journal on Selected Areas in Communications.

[9]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[10]  Willi Meier,et al.  Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.

[11]  W. Kinsner,et al.  Secure and resilient data printed on paper , 1999, Engineering Solutions for the Next Millennium. 1999 IEEE Canadian Conference on Electrical and Computer Engineering (Cat. No.99TH8411).

[12]  Xiaobo Li,et al.  Partial encryption of compressed images and videos , 2000, IEEE Trans. Signal Process..

[13]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[14]  Thomas Siegenthaler,et al.  Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.