A Synchronous Stream Cipher Generator Based on Quadratic Fields (SSCQF)
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 12
Abstract
In this paper, we propose a new synchronous stream cipher called SSCQF whose secret-key is Ks=(z1,...zn) where zi is a positive integer. Let d1, d2,..., dN be N positive integers in {0,1,...2m -1} such that di=zi mod2m with m and m>=8. Our purpose is to combine a linear feedback shift registers LFSRs, the arithmetic of quadratic fields: more precisely the unit group of quadratic fields, and Boolean functions [14]. Encryption and decryption are done by XRO`ing the output pseudorandom number generator with the plaintext and ciphertext respectively. The basic ingredients of this proposal stream generator SSCQF rely on the three following processes: In process I , we constructed the initial vectors IV={X1,...,Xn} from the secret-key Ks=(z1,...zn) by using the fundamental unit of Q( Nvdi) if di is a square free integer otherwise by splitting di, and in process II, we regenerate, from the vectors Xi, the vectors Yi having the same length L, that is divisible by 8 (equations (2) and (3) ). In process III , for each Yi , we assign L/8 linear feedback shift registers, each of length eight. We then obtain N x L/8 linear feedback shift registers that are initialized by the binary sequence regenerated by process II , filtered by primitive polynomials, and the combine the binary sequence output with L/8 Boolean functions. The keystream generator, denoted K , is a concatenation of the output binary sequences of all Boolean functions.
Authors and Affiliations
Younes ASIMI, Ahmed ASIMI
E-learning Document Search Method with Supplemental Keywords Derived from Keywords in Meta-Tag and Descriptions which are Included in the Header of the First Search Result
Optimization method for e-learning document search with keywords which are derived from the keywords and descriptions in the meta-tag of web search results together with thesaurus engine is proposed. 15 to 20% of i...
A Performance Evaluation of Multiple Input Queued (MIQ) Switch with Iterative Weighted Slip Algorithm
Many researchers had evaluated the throughput and delay performance of virtual output queued (VOQ) packet switches using iterative weighted/un-weighted scheduling algorithms. Prof. Nick Mckeown from Stanford University h...
Consequences of Customer Engagement in Social Networking Sites : Employing Fuzzy Delphi Technique for Validation
The consequences of the customer engagement in the Social Networking Sites (SNS) community have direct impact on the brand. This present research was conducted to examine the cohesive mechanisms for item verification on...
Good Quasi-Cyclic Codes from Circulant Matrices Concatenation using a Heuristic Method
In this paper we present a method to search q circulant matrices; the concatenation of these circulant matrices with circulant identity matrix generates quasi-cyclic codes with high various code rate q/(q+1) (q an intege...
Comparative Study of PMSG Controllers for Variable Wind Turbine Power Optimization
With a large increase in wind power generation, the direct driven Permanent Magnet Synchronous Generator is the most promising technology for variable speed operation and it also fulfills the grid requirements with high...