Cryptographic properties of nonlinear pseudorandom number generators

The cryptographic properties of keystreams generated by stream ciphers based on t-functions are studied. These constructions are of great interest as they allow building highly efficient and secure cryptographic primitives. The randomness of the coordinate sequences generated by such mappings is analyzed in terms of the autocorrelation function. The results derived are valid for all t-functions regardless the type of construction and indicate the existence of nonrandomness. As the problem of the efficient implementation of secure s-boxes is open, the nonlinearity of t-functions is also analyzed. It is shown how some cryptographically undesirable properties, can be solved by application of similarity transformations.

[1]  Nicholas Kolokotronis,et al.  On the linear complexity of nonlinearly filtered PN-sequences , 2003, IEEE Trans. Inf. Theory.

[2]  Donald Ervin Knuth,et al.  The Art of Computer Programming , 1968 .

[3]  Tor Helleseth,et al.  Alinear weakness in the Klimov-Shamir T-function , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[4]  David L. desJardins,et al.  Polynomial Mappings mod p^n , 2001 .

[5]  Vladimir Anashin,et al.  Uniformly distributed sequences of p-adic integers, II , 2002, math/0209407.

[6]  Magnus Daum,et al.  Narrow T-Functions , 2005, FSE.

[7]  V. S. Anachin Uniformly distributed sequences ofp-adic integers , 1994 .

[8]  Vladimir Anashin,et al.  Non-Archimedean analysis, T-functions, and cryptography , 2006, ArXiv.

[9]  Adi Shamir,et al.  A New Class of Invertible Mappings , 2002, CHES.

[10]  G. Mayhew,et al.  Auto-correlation properties of modified de Bruijn sequences , 2000, IEEE 2000. Position Location and Navigation Symposium (Cat. No.00CH37062).

[11]  Donald E. Knuth,et al.  The Art of Computer Programming, Volumes 1-3 Boxed Set , 1998 .

[12]  Vladimir Anashin,et al.  Uniformly distributed sequences in computer algebra or how to construct program generators of random numbers , 1998 .

[13]  M. V. Larin,et al.  Transitive polynomial transformations of residue class rings , 2002 .

[14]  Adi Shamir,et al.  Cryptographic Applications of T-Functions , 2003, Selected Areas in Cryptography.

[15]  Vladimir Anashin,et al.  Pseudorandom number generation by p-adic ergodic transformations: an addendum , 2004, ArXiv.

[16]  Dong Hoon Lee,et al.  A New Class of Single Cycle T-Functions , 2005, FSE.

[17]  Vladimir Anashin Wreath Products in Stream Cipher Design , 2006, ArXiv.

[18]  Adi Shamir,et al.  New Applications of T-Functions in Block Ciphers and Hash Functions , 2005, FSE.

[19]  Thomas Peyrin,et al.  Linear Cryptanalysis of the TSC Family of Stream Ciphers , 2005, ASIACRYPT.

[20]  Adi Shamir,et al.  New Cryptographic Primitives Based on Multiword T-Functions , 2004, FSE.

[21]  R. Rivest Permutation Polynomials Modulo 2w , 2001 .

[22]  Palash Sarkar,et al.  Time-Memory Trade-Off Attacks on Multiplications and T-Functions , 2004, ASIACRYPT.

[23]  Nicholas Kolokotronis,et al.  Cryptographic Properties of Stream Ciphers Based on T-functions , 2006, 2006 IEEE International Symposium on Information Theory.