Table of Contents
Advances in Artificial Intelligence
Volume 2011, Article ID 464971, 10 pages
http://dx.doi.org/10.1155/2011/464971
Research Article

Generalization of the Self-Shrinking Generator in the Galois Field G F ( 𝑝 𝑛 )

1Computer Systems Department, Faculty of Computer Systems and Control, Technical University of Sofia, 8 Kliment Ohridski Street, Sofia 1000, Bulgaria
2Communication and Computer Technique Department, National Military University “Vasil Levski”, 1a Karel Shkorpil Street, Shumen 9701, Bulgaria
3Computer System and Technology Department, University of Shumen “Bishop Konstantin Preslavsky”, 115 Universitetska Street, Shumen 9712, Bulgaria

Received 13 December 2010; Revised 5 February 2011; Accepted 24 February 2011

Academic Editor: Farouk Yalaoui

Copyright © 2011 Antoniya Todorova Tasheva et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. A. Afzal, WiMAX Security (MAC and Physical Layer), NYC OEM Consultation Project, Spring, Willits, Calif, USA, 2006.
  2. S. W. Golomb and G. Gong, Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar, Cambridge University Press, New York, NY, USA, 2005.
  3. M. K. Chetry and W. B. Vasantha Kandaswamy, β€œA note on self-shrinking lagged fibonacci generator,” International Journal of Network Security, vol. 11, no. 1, pp. 11–13, 2010. View at Google Scholar
  4. D. Coppersmith, H. Krawczyk, and Y. Mansour, β€œThe shrinking generator,” in Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT '93), vol. 773, pp. 22–39, Springer, Berlin, Germany, 1993.
  5. E. J. Dudewicz and T. G. Ralley, The Handbook of Random Number Generation and Testing with TESTRAND Computer Code, American Sciences Press, Columbus, Ohio, USA, 1981.
  6. A. Fúster-Sabatera and P. Caballero-Gil, β€œAnalysis of the generalized self-shrinking generator,” Computers & Mathematics with Applications, vol. 61, no. 4, pp. 871–880, 2011. View at Google Scholar
  7. G. Guang, Sequence Analysis, Department of Combinatorics and Optimization, University of Waterloo, Ontario, Canada, 1999.
  8. A. Kanso, β€œModified self-shrinking generator,” Computers and Electrical Engineering, vol. 36, pp. 993–1001, 2010. View at Publisher Β· View at Google Scholar
  9. H. Krawczyk, β€œThe shrinking generator: some practical considerations,” in Proceedings of the International Workshop on Fast Software Encryption, R. Andersen, Ed., vol. 809 of Lecture Notes in Computer Science, pp. 45–46, Springer, Berlin, Germany, 1994.
  10. J. L. Massey, β€œSome applications of coding theory in cryptography,” in Codes and Ciphers: Cryptography and Coding IV, P. G. Farrell, Ed., pp. 33–47, Formara, Essex, UK, 1995. View at Google Scholar
  11. W. Meier and O. Staffelbach, β€œThe self-shrinking generator,” in Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT '94), A. De Santis, Ed., vol. 950 of Lecture Notes in Computer Science, pp. 205–214, Springer, Berlin, Germany, 1995.
  12. B. Schneier, Applied Cryptography, John Wiley & Sons, New York, NY, USA, 1998.
  13. B. Stoyanov, A. Milev, and A. Nachev, β€œResearch on the self-shrinking 2-adic cryptographic generator,” Journal of Communication and Computer, vol. 7, no. 11, pp. 67–71, 2010. View at Google Scholar
  14. I. Shparlinski, β€œOn some properties of the shrinking generator,” Designs, Codes, and Cryptography, vol. 23, no. 2, pp. 147–155, 2001. View at Publisher Β· View at Google Scholar Β· View at MathSciNet
  15. S. R. Blackburn, β€œThe linear complexity of the self-shrinking generator,” IEEE Transactions on Information Theory, vol. 45, no. 6, pp. 2073–2077, 1999. View at Google Scholar
  16. B. Stoyanov, β€œImproved cryptanalysis of the self-shrinking p-adic cryptographic generator,” in Proceedings of the International Conference Information Research and Applications, M. Krassimir, I. Krassimir, and M. Ilia, Eds., pp. 112–115, Varna, Bulgaria, July 2008.
  17. M. J. Mihaljevic, β€œA faster cryptanalysis of self-shrinking generator,” in Proceedings of the Australasian Conference on Information Security and Privacy (ACISP '96), J. Pieprzyk and J. Seberry, Eds., vol. 1172 of Lecture Notes in Computer Science, pp. 182–189, Springer, Berlin, Germany, 1996.
  18. E. Zenner, M. Krause, and S. Lucks, β€œImproved cryptanalysis of self-shrinking generator,” in Proceedings of the Australasian Conference on Information Security and Privacy (ACIPS ;01), vol. 2119 of Lecture Notes in Computer Science, pp. 21–35, Springer, Berlin, Germany, 2001.
  19. M. Krause, β€œBDD-based cryptanalysis of keystream generators,” in Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques (EUROCRYPT '02), vol. 2332/2002 of Lecture Notes in Computer Science, pp. 222–237, Springer, Berlin, Germany, 2002.
  20. M. Hell and T. Johansson, β€œTwo new attacks on the self-shrinking generator,” IEEE Transactions on Information Theory, vol. 52, no. 8, pp. 3837–3843, 2006. View at Publisher Β· View at Google Scholar Β· View at MathSciNet
  21. B. Zhang and D. Feng, β€œNew guess-and-determine attack on the self-shrinking generator,” in Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT '06), vol. 4284/2006, pp. 54–68, Springer, Berlin, Germany, 2006.
  22. T. Tashev and B. Bedzhev, β€œModeling of the linear feedback shift registers in the galois field with arbitrary prime base,” in Proceedings of the International Scientific and Applied Science Conference, pp. 261–265, 2006.
  23. A. Rukhin, J. Soto, J. Nechvatal et al., Special Publication 800-22, Revision 1a, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, April 2010, ps. 131, http://csrc.nist.gov/groups/ST/toolkit/rng/documents/SP800-22rev1a.pdf.