Fuzzy Logic-Based Security Evaluation of Stream Cipher

Author(s):  
Sattar B. Sadkhan Al Maliky ◽  
Sabiha F. Jawad

The main aim of this chapter is to provide a security evaluation method based on fuzzy logic “for a pseudo-random sequences used (mainly) in stream cipher systems. The designed Fuzzy rules consider two main parameters, which are the length of the maximum period of the key sequence obtained from Linear Feedback Shift Register (LFSR) and the entropy of the result in sequences obtained from different lengths of the shift registers. The security (complexity) evaluation method is applied to the summation generator (a type of non-linear feedback shift register) in this chapter. First it is applied to its original well-known form (with one bit memory); then the evaluation method is applied to the developed summation generator (by varying the number of the delayed bits by two and by three bits). The acceptability of the results of developed evaluation method indicates a goodness of such developed approach in the security evaluation.

2015 ◽  
pp. 277-298 ◽  
Author(s):  
Sattar B. Sadkhan Al Maliky ◽  
Sabiha F. Jawad

The main aim of this chapter is to provide a security evaluation method based on fuzzy logic “for a pseudo-random sequences used (mainly) in stream cipher systems. The designed Fuzzy rules consider two main parameters, which are the length of the maximum period of the key sequence obtained from Linear Feedback Shift Register (LFSR) and the entropy of the result in sequences obtained from different lengths of the shift registers. The security (complexity) evaluation method is applied to the summation generator (a type of non-linear feedback shift register) in this chapter. First it is applied to its original well-known form (with one bit memory); then the evaluation method is applied to the developed summation generator (by varying the number of the delayed bits by two and by three bits). The acceptability of the results of developed evaluation method indicates a goodness of such developed approach in the security evaluation.


1970 ◽  
Vol 4 ◽  
pp. 59-60
Author(s):  
M. García-Bosque ◽  
C. Sánchez-Azqueta ◽  
S. Celma

In this paper we propose a new fast and secure stream cipher based on a Modified Logistic Map and a Linear Feedback Shift Register.


Author(s):  
Miguel García Bosque ◽  
Adrián Pérez ◽  
Carlos Sánchez-Azqueta ◽  
Santiago Celma

In this work, we have used a new concept of sensor-based seed generator in order to generate the keys for a stream cipher based on Skew Tent Map and a Linear Feedback Shift Register. The cryptosystem has been implemented in a Xilinx Virtex 7 FPGA VC707 Evaluation Kit and has been proven to be fast and secure.


Sign in / Sign up

Export Citation Format

Share Document