Military Communications and Information Technology: A Trusted ...

Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...

22.01.2015 Views

454 Military Communications and Information Technology... [7] D. Ezell et al. “XML Schema”, in http://www.w3.org/XML/Schema, World Wide Web Consortium, 2004 (retrieved 23.4.2012). [8] W. Ford, et al., ”XML Key Management Specification (XKMS), W3C Note 13.3.2001”, in http://www.w3.org/TR/xkms/ World Wide Web Consortium, 2002 (retrieved 23.4.2012). [9] W. Harrison, N. Hanebutte, P. Oman and J. Alves-Foss, “The MILS Architecture for a Secure Global Information Grid”. in CrossTalk 18 (10): pp. 20-24. http://www. crosstalkonline.org/storage/issue-archives/2005/200510/200510-Harrison.pdf, October 2005 (retrieved 23.4.2012). [10] L. Hathaway, “National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information”, http:// csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf, June 2003 (retrieved 23.4.2012). [11] T. Imamura, B. Dillaway, and E. Simon, “XML Encryption Syntax and Processing, W3C Recommendation 10.12.2002”, in http://www.w3.org/TR/xmlenc-core/, World Wide Web Consortium, 2002 (retrieved 23.4.2012). [12] M. Kiviharju, Content-Based Information Security (CBIS): Definitions, Requirements and Cryptographic Architecture, Riihimäki: Defence Forces Technical Research Centre, 2010. [13] M. Kiviharju, “Towards Pervasive Cryptographic Access Control Models”, in Proc. SECRYPT 2012, in press. [14] J. Lamminmäki, “DR201R01: CBIS-skeema, Loppuraportti.” Final Report for Finnish Defence Forces, Insta DefSec, 8.12.2010. [15] S. McGovern, “Information Security Requirements for a Coalition Wide Area Network”, Thesis in Naval Postgraduate School, Monterey, California (June 2001), http://cisr.nps.edu/downloads/theses/01thesis_mcgovern.pdf, NPS/CISR, 2001, (retrieved 23.4.2012). [16] NIST-CSRC, “CSC-STD-004-85, Technical Rational Behind CSC-STD-003-85: Computer Security Requirements (Yellow Book)”, in http://csrc.nist.gov/publications/ secpubs/rainbow/std004.txt, CSRC, NIST, pp. 9-13, 25.6.1985 (retrieved 23.4.2012). [17] M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure Attribute-Based Systems”, in Proc. Of CCS 2006, pp. 99-111, ACM, 2006. [18] J. Savoie, “A Strong three-factor authentication device: TrustedDAVE and the new Generic Content-Based Information Security (CBIS) architecture”, Technical Memorandum TM 2004-198, DRDC Ottawa, http://pubs.drdc.gc.ca/PDFS/unc32/ p522843.pdf, DRDC Canada, November 2004 (retrieved 23.4.2012). [19] C. Sperberg-McQueen et al., “Extensible Markup Language (XML)”, in http:// www.w3.org/XML/Overview.html, World Wide Web Consortium, September 2006 (retrieved 23.4.2012). [20] B. Thuraisingham, Building Trustworthy Semantic Webs, Boca Raton, FL: Auerbach Publications, 2008. [21] ibid. p. 118. [22] K. Poulsen, K. Zetter, “U.S. Intelligence Analyst Arrested in Wikileaks Video Probe”, in ‘Threat Level’ blog, http://www.wired.com/threatlevel/2010/06/leak/, Wired, 6.6.2010 (retrieved 23.4.2010).

Generation of Nonlinear Feedback Shift Registers with Special-Purpose Hardware Tomasz Rachwalik, Janusz Szmidt, Robert Wicik, Janusz Zabłocki Cryptology Division, Military Communication Institute, Zegrze, Poland, t.rachwalik@wil.waw.pl Abstract: The nonlinear feedback shift registers (NLFSR) are used as primitives in cryptographic algorithms. Their theory is not so complete as that of the linear feedback shift registers (LFSR). In general, it is not known how to construct NLFSRs with maximum period. The direct method is to search for such registers with suitable properties. We used the implementation of NLFSRs in Field Programmable Gate Arrays (FPGA) to perform a corresponding search. We also investigated local statistical properties of the binary sequences generated by NLFSRs of order 25 and 27. Keywords: Nonlinear feedback shift registers. Maximum period. Linear complexity. Hardware implementation. Randomness properties I. Introduction Feedback shift registers (FSR) sequences have been widely used in many areas of communication theory, as key stream generators in stream ciphers cryptosystems, pseudorandom number generators in many cryptographic primitive algorithms, and testing vectors in hardware design. Golomb’s book [5] is a pioneering one that discusses this type of sequences. A modern treatment of the subject is contained in Golomb and Gong [6]. The theory of linear feedback shift registers (LFSR) is understood quite well. In particular, it is known how to construct the LFSRs with maximum period; they correspond to primitive minimal polynomials over the binary field GF(2). The primitive LFSRs have a drawback as their linear complexity is equal to their order. In recent years, nonlinear feedback shift registers (NLFSR) have received much attention in designing numerous cryptographic algorithms such as stream ciphers and lightweight block ciphers to provide security in communication systems. In most cases, NLFSRs have much bigger linear complexity than LFSRs of the same order. However, not much is known about cyclic structures of NLFSRs; most of the known results are collected in Golomb’s fundamental book [5]. We used the implementation of NLFSRs in Field Programmable Gate Arrays (FPGA) to perform a search of NLFSRs of the order up to n = 27, the maximum

Generation of Nonlinear Feedback Shift Registers<br />

with Special-Purpose Hardware<br />

Tomasz Rachwalik, Janusz Szmidt, Robert Wicik, Janusz Zabłocki<br />

Cryptology Division, <strong>Military</strong> Communication Institute, Zegrze, Pol<strong>and</strong>,<br />

t.rachwalik@wil.waw.pl<br />

Abstract: The nonlinear feedback shift registers (NLFSR) are used as primitives in cryptographic<br />

algorithms. Their theory is not so complete as that of the linear feedback shift registers (LFSR).<br />

In general, it is not known how to construct NLFSRs with maximum period. The direct method is to<br />

search for such registers with suitable properties. We used the implementation of NLFSRs in Field<br />

Programmable Gate Arrays (FPGA) to perform a corresponding search. We also investigated local<br />

statistical properties of the binary sequences generated by NLFSRs of order 25 <strong>and</strong> 27.<br />

Keywords: Nonlinear feedback shift registers. Maximum period. Linear complexity. Hardware implementation.<br />

R<strong>and</strong>omness properties<br />

I. Introduction<br />

Feedback shift registers (FSR) sequences have been widely used in many<br />

areas of communication theory, as key stream generators in stream ciphers cryptosystems,<br />

pseudor<strong>and</strong>om number generators in many cryptographic primitive<br />

algorithms, <strong>and</strong> testing vectors in hardware design. Golomb’s book [5] is a pioneering<br />

one that discusses this type of sequences. A modern treatment of the subject<br />

is contained in Golomb <strong>and</strong> Gong [6].<br />

The theory of linear feedback shift registers (LFSR) is understood quite well.<br />

In particular, it is known how to construct the LFSRs with maximum period;<br />

they correspond to primitive minimal polynomials over the binary field GF(2).<br />

The primitive LFSRs have a drawback as their linear complexity is equal to their<br />

order. In recent years, nonlinear feedback shift registers (NLFSR) have received much<br />

attention in designing numerous cryptographic algorithms such as stream ciphers<br />

<strong>and</strong> lightweight block ciphers to provide security in communication systems. In most<br />

cases, NLFSRs have much bigger linear complexity than LFSRs of the same order.<br />

However, not much is known about cyclic structures of NLFSRs; most of the known<br />

results are collected in Golomb’s fundamental book [5].<br />

We used the implementation of NLFSRs in Field Programmable Gate Arrays<br />

(FPGA) to perform a search of NLFSRs of the order up to n = 27, the maximum

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!