On Cryptographic Applications of Word Oriented LFSR
dc.contributor.author | Nandi, Subrata | |
dc.date.accessioned | 2025-03-10T10:00:11Z | |
dc.date.available | 2025-03-10T10:00:11Z | |
dc.date.issued | 2024 | |
dc.description | Supervisors: Mitra, Pinaki and Krishnaswamy, Srinivasan | |
dc.description.abstract | The knowledge of the feedback function plays a critical role in most attacks on LSFR based stream ciphers. These include Algebraic attacks, Correlation attacks, Distinguishing attacks, Guess and determine attacks, Cache timing attacks etc. Therefore, hiding the feedback function of the LFSR could potentially increase the security of such schemes. One way of doing this is by using dynamic feedback control. This approach is used in stream ciphers such as K2 and A5/1. This converts the deterministic linear recurrence into a probabilistic recurrence. However, key recovery attacks on K2 and A5/1 are reported. In this thesis, we have suggested methods of hiding the feedback configuration of σ-LFSR and applied it to the ciphers SNOW 2.0 and SNOW 3G to resist known plaintext attacks | |
dc.identifier.other | ROLL NO.156101007 | |
dc.identifier.uri | https://gyan.iitg.ac.in/handle/123456789/2807 | |
dc.language.iso | en | |
dc.relation.ispartofseries | TH-3432 | |
dc.title | On Cryptographic Applications of Word Oriented LFSR | |
dc.type | Thesis |
Files
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed to upon submission
- Description: