Abstract
Stream ciphers are increasingly used for lightweight applications like RFID, Bluetooth, and Wi-Fi communications where the length of the plaintext is initially unknown. Generally, the stream ciphers are characterized by fast encryption and decryption speed. The LFSR-based stream cipher can generate pseudorandom binary strings with good cryptographic properties. Hardware implementation cost is also minimum for it. In this paper, we have discussed the architecture and properties of the LFSR. We have also discussed the properties of secured Boolean function as one of the important components of stream cipher. Here, we have implemented a generalized nonlinear combination of generator-based model comprising LFSR/NLFSR and Boolean function for designing a pRNG. The bitstream properties of pRNG are tabulated and compared with their best attainable parameters.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
LF is represented as LFSR.
References
eSTREAM: the ECRYPT Stream Cipher Project. http://www.ecrypt.eu.org/stream/
Kocheta, M., Sujatha, N., Sivakanya, K., Srikanth, R., Shetty, S., Mohan, P.A.: A review of some recent stream ciphers. In: 2013 International conference on Circuits, Controls and Communications (CCUBE). (2013)
Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A survey of lightweight-cryptography implementations. IEEE Design & Test of Computers 24(6) (2007) 522–533
Videau, M. In: eSTREAM. Springer US, Boston, MA (2011) 426–427
Shehhi, M.A.A., Baek, J., Yeun, C.Y.: The use of boolean functions in stream ciphers. In: Internet Technology and Secured Transactions (ICITST), 2011 International Conference for. (Dec 2011) 29–33
Maitra, S., Sarkar, P.: Cryptographically significant boolean functions with five valued walsh spectra. Theoretical Computer Science 276(1) (2002) 133–146
Maitra, S.: Autocorrelation properties of correlation immune boolean functions. In: International Conference on Cryptology in India, Springer (2001) 242–253
Nawaz, Y., Gong, G., Gupta, K.C. In: Upper Bounds on Algebraic Immunity of Boolean Power Functions. Springer Berlin Heidelberg, Berlin, Heidelberg (2006) 375–389
Deb, S., Biswas, B., Kar, N. In: Study of NLFSR and Reasonable Security Improvement on Trivium Cipher. Springer India, New Delhi (2015) 731–739
Klapper, A., Goresky, M. In: Cryptanalysis Based on 2-Adic Rational Approximation. Springer Berlin Heidelberg, Berlin, Heidelberg (1995) 262–273
Klapper, A., Goresky, M.: Feedback shift registers, 2-adic span, and combiners with memory. Journal of Cryptology 10(2) (1997) 111–147
El Hennawy, H.M., Omar, A.E., Kholaif, S.M.: Lea: link encryption algorithm proposed stream cipher algorithm. Ain Shams Engineering Journal 6(1) (2015) 57–65
Khan, M.A., Khan, A.A., Mirza, F.: Transform domain analysis of sequences. CoRR arXiv:1503.00943 (2015)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Deb, S., Bhuyan, B., Gupta, N.C. (2018). Design and Analysis of LFSR-Based Stream Cipher. In: Mandal, J., Saha, G., Kandar, D., Maji, A. (eds) Proceedings of the International Conference on Computing and Communication Systems. Lecture Notes in Networks and Systems, vol 24. Springer, Singapore. https://doi.org/10.1007/978-981-10-6890-4_61
Download citation
DOI: https://doi.org/10.1007/978-981-10-6890-4_61
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-6889-8
Online ISBN: 978-981-10-6890-4
eBook Packages: EngineeringEngineering (R0)