Pseudorandom Bit Generators in Stream-Cipher Cryptography

  • Authors:
  • Kencheng Zeng;Chung-Huang Yang;Dah-Yea Wei;T. R. N. Rao

  • Affiliations:
  • Univ. of Southwestern Louisiana, Lafayette, LA;Univ. of Southwestern Louisiana, Lafayette, LA;Univ. of Southwestern Louisiana, Lafayette, LA;Univ. of Southwestern Louisiana, Lafayette, LA

  • Venue:
  • Computer - Special issue on cryptography
  • Year:
  • 1991

Quantified Score

Hi-index 0.06

Visualization

Abstract

Progress in the design and analysis of pseudorandom bit generators over the last decade is surveyed. Background information is provided, and the linear feedback shift registers that serve as building blocks for constructing the generators are examined. Three methods for attacking keystream generators are reviewed, and three techniques for designing them are considered, focusing on how they fail or how their weakness is exposed under the attacks previously described. These techniques are nonlinear feedforward transformation, step control, and multiclocking.