الملخص الإنجليزي
At one end, tremendous advances in information technology faces the challenges of ultra-high speed data communication. On the other hand, the infrastructure of information society necessitates and demands for more and more secure communication links. Thus, mutual authentication, integrity and confidentiality have become an essential part of bulk of information. In this scenario, for high-speed networks, stream ciphering mechanisms have become an appropriate and essential technology of the age.
Most often Linear Feedback Shift Registers (LFSRs) are used in hardware designs of the stream ciphers. This is the reason that most practical stream ciphers center on LFSRs. However, because of well-set mathematical properties of the sequences generated by LFSRs, the analyzing of stream ciphers is often easier than of analyzing block ciphers. But by knowing the 2n bits of the sequence generated by an n-bit LFSR, the structure of the LFSR can be computed. Thus, because of these, the sequence generated by LFSRs cannot be simply used for stream ciphering. .
Further, a stream ciphering sequence is subjected to meet the standard cryptographic criteria such as a large period, high linear complexity, and good statistical properties. The need to generate more complex sequence led to the idea of using multiple LFSRs and some how mixing their generated sequences in some manner. In this work we use three different structures for mixing those multiple LFSRs. In all the type of the structures of the combiners, we use to combine the sequences generated by four input LFSRs of small lengths. However, different filter circuits control these structures. Two of the filter circuits use only an LFSR while another is based on a set of the two LFSRs of same lengths. The period of the resultant generated sequences can be controlled by least common multiples of periods of each LFSRs, used either in combiner or in the filter circuits.
In order to evaluate the strength of stream ciphering we used several types of tests. We used all such test namely; Golomb's postulates, correlation properties, frequency/equi-distribution, serial, run length, and Poker test to validate the proposed designs. Also, a large number of sequences are generated with the variations of the parameters like the lengths, initial conditions and characteristic polynomials of the LFSRs used in the combiner as well as filter circuits.
On the basis of the results of the analysis it is found that the Third structure, which uses a set of two LFSRs, of same lengths in the filter circuit, is the optimum one. Most the sequences generated by the Third structure passes all the desired tests for strong stream ciphering satisfactorily.