انت هنا الان : شبكة جامعة بابل > موقع الكلية > نظام التعليم الالكتروني > مشاهدة المحاضرة

L9 Stream cipher systems

الكلية كلية العلوم للبنات     القسم قسم الحاسبات     المرحلة 4
أستاذ المادة محمد عبد الله ناصر الزبيدي       10/12/2012 17:35:40
3.6 STREAM ENCRYPTION APPROACHES:
There are two different approaches to stream encryption they are; synchronous methods and self-synchronous methods.
3.6.1 SYNCHRONOUS STREAM CIPHERS:
In a synchronous stream cipher the key stream is generated independently of the message stream. The algorithm that generates the stream must be deterministic so the stream can be reproduced for decryption. This means that if a ciphertext is lost during transmission, the sender and receiver must resynchronize their key generators before they can proceed. Furthermore, this must be done with out repeating any part of the key. The starting state of the generator is initialized by a "seed" 10 as illustrated in figure 3-5.
Synchronous stream ciphers have the advantage of not propagating errors. A transmission error effecting one character will not affect subsequent characters. From another point of view; this is a disadvantage in that it is easier for an opponent to modify (with out detection) a single ciphertext character.
3.6.2 SELF-SYNCHRONOUS STREAM CIPHERS
A self-synchronous stream ciphers derives each key character from a fixed number n of preceding cipher text character. This is done by using a cipher feed back mode (CFB) because the ciphertext characters participate in the feed back loop. It is some times called chaining, because each ciphertext character depend on
Key generator
Key generator
Ki key generator
Ci
10
10
Ki key generator
Mi
Encipher
Decipher
Figure 3-5 synchronous stream cipher
Lec 9 : Data Security Stream Cipher Systems
2
……
……
10
EB
EB
Mi
Ki
Ci
Mi
preceding cipher-text character (chain) the feed back as shown figure 3-6. The feedback register R is a shift register when each cipher text character Ci is shifted into one end ofR immediately after being generated, the character at the other end is discarded. Register R is initialized to the seed 10. During each iteration, the value ofR is used as input to a block encryption algorithm (EB), the right most character of the algorithm becomes the next key character. If a ciphertext character is altered or lost during transmission, the receiver s shift register will differ from the transmitter s, and subsequent cipher text will not be correctly deciphered until the error character is shifted out of the register.
3.7 NONLINEAR SHIFT REGISTER:
Linear feedback shift registers are unsafe because they have relatively small linear complexity, and hence a relatively small fragment of the key streams (LFSR sequence) can be used to obtain the entire sequence by solving a set of linear equations. To increase the linear complexity of LFSR, one or more output sequences of LFSR s are combined with some nonlinear function to produce relatively high linear complexity. For example shift register SR1 generates sequence (S1) with sequence length of 2n-1 , and shift register SR2 generates sequence (S2) with sequence length of (2m-1), then the output sequence (S3) will be:
S3 = S1 * S2 with period (sequence length) = (2n -1) ^ (2m -1)
A wide range of nonlinear stream generators can be obtained by the following means:
Figure 3-6 self-synchronous stream cipher

المادة المعروضة اعلاه هي مدخل الى المحاضرة المرفوعة بواسطة استاذ(ة) المادة . وقد تبدو لك غير متكاملة . حيث يضع استاذ المادة في بعض الاحيان فقط الجزء الاول من المحاضرة من اجل الاطلاع على ما ستقوم بتحميله لاحقا . في نظام التعليم الالكتروني نوفر هذه الخدمة لكي نبقيك على اطلاع حول محتوى الملف الذي ستقوم بتحميله .