Skip to main content

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 24))

  • 1214 Accesses

Abstract

Stream ciphers are increasingly used for lightweight applications like RFID, Bluetooth, and Wi-Fi communications where the length of the plaintext is initially unknown. Generally, the stream ciphers are characterized by fast encryption and decryption speed. The LFSR-based stream cipher can generate pseudorandom binary strings with good cryptographic properties. Hardware implementation cost is also minimum for it. In this paper, we have discussed the architecture and properties of the LFSR. We have also discussed the properties of secured Boolean function as one of the important components of stream cipher. Here, we have implemented a generalized nonlinear combination of generator-based model comprising LFSR/NLFSR and Boolean function for designing a pRNG. The bitstream properties of pRNG are tabulated and compared with their best attainable parameters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    LF is represented as LFSR.

References

  1. eSTREAM: the ECRYPT Stream Cipher Project. http://www.ecrypt.eu.org/stream/

  2. Kocheta, M., Sujatha, N., Sivakanya, K., Srikanth, R., Shetty, S., Mohan, P.A.: A review of some recent stream ciphers. In: 2013 International conference on Circuits, Controls and Communications (CCUBE). (2013)

    Google Scholar 

  3. Eisenbarth, T., Kumar, S., Paar, C., Poschmann, A., Uhsadel, L.: A survey of lightweight-cryptography implementations. IEEE Design & Test of Computers 24(6) (2007) 522–533

    Google Scholar 

  4. Videau, M. In: eSTREAM. Springer US, Boston, MA (2011) 426–427

    Google Scholar 

  5. Shehhi, M.A.A., Baek, J., Yeun, C.Y.: The use of boolean functions in stream ciphers. In: Internet Technology and Secured Transactions (ICITST), 2011 International Conference for. (Dec 2011) 29–33

    Google Scholar 

  6. Maitra, S., Sarkar, P.: Cryptographically significant boolean functions with five valued walsh spectra. Theoretical Computer Science 276(1) (2002) 133–146

    Google Scholar 

  7. Maitra, S.: Autocorrelation properties of correlation immune boolean functions. In: International Conference on Cryptology in India, Springer (2001) 242–253

    Google Scholar 

  8. Nawaz, Y., Gong, G., Gupta, K.C. In: Upper Bounds on Algebraic Immunity of Boolean Power Functions. Springer Berlin Heidelberg, Berlin, Heidelberg (2006) 375–389

    Google Scholar 

  9. Deb, S., Biswas, B., Kar, N. In: Study of NLFSR and Reasonable Security Improvement on Trivium Cipher. Springer India, New Delhi (2015) 731–739

    Google Scholar 

  10. Klapper, A., Goresky, M. In: Cryptanalysis Based on 2-Adic Rational Approximation. Springer Berlin Heidelberg, Berlin, Heidelberg (1995) 262–273

    Google Scholar 

  11. Klapper, A., Goresky, M.: Feedback shift registers, 2-adic span, and combiners with memory. Journal of Cryptology 10(2) (1997) 111–147

    Google Scholar 

  12. El Hennawy, H.M., Omar, A.E., Kholaif, S.M.: Lea: link encryption algorithm proposed stream cipher algorithm. Ain Shams Engineering Journal 6(1) (2015) 57–65

    Google Scholar 

  13. Khan, M.A., Khan, A.A., Mirza, F.: Transform domain analysis of sequences. CoRR arXiv:1503.00943 (2015)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Subhrajyoti Deb .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Deb, S., Bhuyan, B., Gupta, N.C. (2018). Design and Analysis of LFSR-Based Stream Cipher. In: Mandal, J., Saha, G., Kandar, D., Maji, A. (eds) Proceedings of the International Conference on Computing and Communication Systems. Lecture Notes in Networks and Systems, vol 24. Springer, Singapore. https://doi.org/10.1007/978-981-10-6890-4_61

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-6890-4_61

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-6889-8

  • Online ISBN: 978-981-10-6890-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics