Skip to main content
Top
Published in: Designs, Codes and Cryptography 10/2019

09-02-2019

On the uniqueness of a type of cascade connection representations for NFSRs

Authors: Tian Tian, Jia-Min Zhang, Wen-Feng Qi

Published in: Designs, Codes and Cryptography | Issue 10/2019

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cascade connection architectures of nonlinear feedback shift registers (NFSRs) have been widely used in cryptography. In particular, the Grain family of stream ciphers uses the cascade connection architecture of an LFSR into an NFSR. A cascade connection representation is not always unique. The nonuniqueness of the representation may threat the security of a cipher. Inspired by the Grain family of stream ciphers, in this paper, we focus on cascade connections of an LFSR into an NFSR. A necessary and sufficient condition for the uniqueness of this class of cascade connection representations is provided under a reasonable condition that the involved NFSR has only trivial cascade connection decompositions. In particular, as a direct application of new results, it is theoretically proved that the cascade connection representation of a Grain-like structure, an n-bit primitive LFSR into an n-bit NFSR with a positive integer n, is unique not considering some trivial distinct representations if the involved n-bit NFSR satisfies the condition. Besides, it is verified that all the main registers used in the Grain family of stream ciphers satisfy the condition.
Appendix
Available only for authorised users
Literature
1.
go back to reference Ågren M., Hell M., Johansson T., Meier W.: Grain-128a: a new version of grain-128 with optional authentication. IJWMC 5(1), 48–59 (2011).CrossRef Ågren M., Hell M., Johansson T., Meier W.: Grain-128a: a new version of grain-128 with optional authentication. IJWMC 5(1), 48–59 (2011).CrossRef
2.
go back to reference Armknecht F., Mikhalev V.: On lightweight stream ciphers with shorter internal states. In: Leander G. (ed.) Fast Software Encryption–22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015, Revised Selected Papers. Lecture Notes in Computer Science, vol. 9054, pp. 451–470. Springer, New York (2015). Armknecht F., Mikhalev V.: On lightweight stream ciphers with shorter internal states. In: Leander G. (ed.) Fast Software Encryption–22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015, Revised Selected Papers. Lecture Notes in Computer Science, vol. 9054, pp. 451–470. Springer, New York (2015).
4.
go back to reference Cannière C.D., Dunkelman O., Knezevic M.: KATAN and KTANTAN—a family of small and efficient hardware-oriented block ciphers. In: Clavier C., Gaj K. (eds.) Cryptographic Hardware and Embedded Systems—CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6–9, 2009, Proceedings, vol. 5747, pp. 272–288. Lecture Notes in Computer ScienceSpringer, New York (2009).CrossRef Cannière C.D., Dunkelman O., Knezevic M.: KATAN and KTANTAN—a family of small and efficient hardware-oriented block ciphers. In: Clavier C., Gaj K. (eds.) Cryptographic Hardware and Embedded Systems—CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6–9, 2009, Proceedings, vol. 5747, pp. 272–288. Lecture Notes in Computer ScienceSpringer, New York (2009).CrossRef
5.
go back to reference Cannière C.D., Preneel B.: Trivium. In: Robshaw M.J.B., Billet O. (eds.) New Stream Cipher Designs—The eSTREAM Finalists. Lecture Notes in Computer Science, vol. 4986, pp. 244–266. Springer, New York (2008).CrossRef Cannière C.D., Preneel B.: Trivium. In: Robshaw M.J.B., Billet O. (eds.) New Stream Cipher Designs—The eSTREAM Finalists. Lecture Notes in Computer Science, vol. 4986, pp. 244–266. Springer, New York (2008).CrossRef
6.
go back to reference Courtois N., Meier W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham E. (ed.) Advances in Cryptology–EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003. Lecture Notes in Computer Science, vol. 2656, pp. 345–359. Springer, New York (2003). Courtois N., Meier W.: Algebraic attacks on stream ciphers with linear feedback. In: Biham E. (ed.) Advances in Cryptology–EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003. Lecture Notes in Computer Science, vol. 2656, pp. 345–359. Springer, New York (2003).
7.
go back to reference Golomb S.W.: Shift Register Sequences. Aegean Park Press, Laguna Hills (1981).MATH Golomb S.W.: Shift Register Sequences. Aegean Park Press, Laguna Hills (1981).MATH
8.
go back to reference Hamann M., Krause M., Meier W.: LIZARD—a lightweight stream cipher for power-constrained devices. IACR Trans. Symmetric Cryptol. 2017(1), 45–79 (2017). Hamann M., Krause M., Meier W.: LIZARD—a lightweight stream cipher for power-constrained devices. IACR Trans. Symmetric Cryptol. 2017(1), 45–79 (2017).
9.
go back to reference Hell M., Johansson T., Maximov A., Meier W.: The grain family of stream ciphers. In: Robshaw M.J.B., Billet O. (eds.) New Stream Cipher Designs—The eSTREAM Finalists. Lecture Notes in Computer Science, vol. 4986, pp. 179–190. Springer, New York (2008).CrossRef Hell M., Johansson T., Maximov A., Meier W.: The grain family of stream ciphers. In: Robshaw M.J.B., Billet O. (eds.) New Stream Cipher Designs—The eSTREAM Finalists. Lecture Notes in Computer Science, vol. 4986, pp. 179–190. Springer, New York (2008).CrossRef
11.
go back to reference Ma Z., Qi W., Tian T.: On the decomposition of an NFSR into the cascade connection of an NFSR into an LFSR. J. Complex. 29(2), 173–181 (2013).MathSciNetCrossRefMATH Ma Z., Qi W., Tian T.: On the decomposition of an NFSR into the cascade connection of an NFSR into an LFSR. J. Complex. 29(2), 173–181 (2013).MathSciNetCrossRefMATH
12.
go back to reference Mikhalev V., Armknecht F., Müller C.: On ciphers that continuously access the non-volatile key. IACR Trans. Symmetric Cryptol. 2016(2), 52–79 (2016). Mikhalev V., Armknecht F., Müller C.: On ciphers that continuously access the non-volatile key. IACR Trans. Symmetric Cryptol. 2016(2), 52–79 (2016).
13.
go back to reference Mykkeltveit J., Siu M., Tong P.: On the cycle structure of some nonlinear shift register sequences. Inf. Control 43(2), 202–215 (1979).CrossRefMATH Mykkeltveit J., Siu M., Tong P.: On the cycle structure of some nonlinear shift register sequences. Inf. Control 43(2), 202–215 (1979).CrossRefMATH
14.
go back to reference Robshaw M.J.B., Billet O. (eds.): New Stream Cipher Designs-The eSTREAM Finalists. Lecture Notes in Computer Science, vol. 4986. Springer, New York (2008).MATH Robshaw M.J.B., Billet O. (eds.): New Stream Cipher Designs-The eSTREAM Finalists. Lecture Notes in Computer Science, vol. 4986. Springer, New York (2008).MATH
15.
go back to reference Zhang J., Qi W., Tian T., Wang Z.: Further results on the decomposition of an NFSR into the cascade connection of an NFSR into an LFSR. IEEE Trans. Inf. Theory 61(1), 645–654 (2015).MathSciNetCrossRefMATH Zhang J., Qi W., Tian T., Wang Z.: Further results on the decomposition of an NFSR into the cascade connection of an NFSR into an LFSR. IEEE Trans. Inf. Theory 61(1), 645–654 (2015).MathSciNetCrossRefMATH
Metadata
Title
On the uniqueness of a type of cascade connection representations for NFSRs
Authors
Tian Tian
Jia-Min Zhang
Wen-Feng Qi
Publication date
09-02-2019
Publisher
Springer US
Published in
Designs, Codes and Cryptography / Issue 10/2019
Print ISSN: 0925-1022
Electronic ISSN: 1573-7586
DOI
https://doi.org/10.1007/s10623-019-00617-w

Other articles of this Issue 10/2019

Designs, Codes and Cryptography 10/2019 Go to the issue

Premium Partner