On Cryptographic Applications of Word Oriented LFSR

dc.contributor.authorNandi, Subrata
dc.date.accessioned2025-03-10T10:00:11Z
dc.date.available2025-03-10T10:00:11Z
dc.date.issued2024
dc.descriptionSupervisors: Mitra, Pinaki and Krishnaswamy, Srinivasan
dc.description.abstractThe knowledge of the feedback function plays a critical role in most attacks on LSFR based stream ciphers. These include Algebraic attacks, Correlation attacks, Distinguishing attacks, Guess and determine attacks, Cache timing attacks etc. Therefore, hiding the feedback function of the LFSR could potentially increase the security of such schemes. One way of doing this is by using dynamic feedback control. This approach is used in stream ciphers such as K2 and A5/1. This converts the deterministic linear recurrence into a probabilistic recurrence. However, key recovery attacks on K2 and A5/1 are reported. In this thesis, we have suggested methods of hiding the feedback configuration of σ-LFSR and applied it to the ciphers SNOW 2.0 and SNOW 3G to resist known plaintext attacks
dc.identifier.otherROLL NO.156101007
dc.identifier.urihttps://gyan.iitg.ac.in/handle/123456789/2807
dc.language.isoen
dc.relation.ispartofseriesTH-3432
dc.titleOn Cryptographic Applications of Word Oriented LFSR
dc.typeThesis
Files
Original bundle
Now showing 1 - 2 of 2
No Thumbnail Available
Name:
Abstract-TH-3432_156101007.pdf
Size:
190.49 KB
Format:
Adobe Portable Document Format
Description:
ABSTRACT
No Thumbnail Available
Name:
TH-3432_156101007.pdf
Size:
14.78 MB
Format:
Adobe Portable Document Format
Description:
THESIS
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed to upon submission
Description: