{"title":"自同步密码算法","authors":"G. Kuhn","doi":"10.1109/COMSIG.1988.49321","DOIUrl":null,"url":null,"abstract":"Necessary conditions are determined for a self-synchronizing steam cipher algorithm to be secure. The stream cipher encryption hardware considered consists of a keystream generator, an exclusive-OR gate to combine the keystream and the binary coded message stream, and circuits to establish initial cryptographic synchronization. The security of the system is based on the use of secret cryptographic keys which must be transmitted to the receiver in advance over a secure route. It is shown that the algorithm (when expressed as a logic function) should be correlation-immune, permutation-immune, and nonlinear in its arguments. An example of a 125-stage 7th-order correlation-immune function is given, and its resistance to cryptanalysis is evaluated.<<ETX>>","PeriodicalId":339020,"journal":{"name":"COMSIG 88@m_Southern African Conference on Communications and Signal Processing. Proceedings","volume":"29 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1988-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":"{\"title\":\"Algorithms for self-synchronizing ciphers\",\"authors\":\"G. Kuhn\",\"doi\":\"10.1109/COMSIG.1988.49321\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Necessary conditions are determined for a self-synchronizing steam cipher algorithm to be secure. The stream cipher encryption hardware considered consists of a keystream generator, an exclusive-OR gate to combine the keystream and the binary coded message stream, and circuits to establish initial cryptographic synchronization. The security of the system is based on the use of secret cryptographic keys which must be transmitted to the receiver in advance over a secure route. It is shown that the algorithm (when expressed as a logic function) should be correlation-immune, permutation-immune, and nonlinear in its arguments. An example of a 125-stage 7th-order correlation-immune function is given, and its resistance to cryptanalysis is evaluated.<<ETX>>\",\"PeriodicalId\":339020,\"journal\":{\"name\":\"COMSIG 88@m_Southern African Conference on Communications and Signal Processing. Proceedings\",\"volume\":\"29 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1988-06-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"9\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"COMSIG 88@m_Southern African Conference on Communications and Signal Processing. Proceedings\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/COMSIG.1988.49321\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"COMSIG 88@m_Southern African Conference on Communications and Signal Processing. Proceedings","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/COMSIG.1988.49321","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Necessary conditions are determined for a self-synchronizing steam cipher algorithm to be secure. The stream cipher encryption hardware considered consists of a keystream generator, an exclusive-OR gate to combine the keystream and the binary coded message stream, and circuits to establish initial cryptographic synchronization. The security of the system is based on the use of secret cryptographic keys which must be transmitted to the receiver in advance over a secure route. It is shown that the algorithm (when expressed as a logic function) should be correlation-immune, permutation-immune, and nonlinear in its arguments. An example of a 125-stage 7th-order correlation-immune function is given, and its resistance to cryptanalysis is evaluated.<>