Military Communications and Information Technology: A Trusted ...
Military Communications and Information Technology: A Trusted ... Military Communications and Information Technology: A Trusted ...
454 Military Communications and Information Technology... [7] D. Ezell et al. “XML Schema”, in http://www.w3.org/XML/Schema, World Wide Web Consortium, 2004 (retrieved 23.4.2012). [8] W. Ford, et al., ”XML Key Management Specification (XKMS), W3C Note 13.3.2001”, in http://www.w3.org/TR/xkms/ World Wide Web Consortium, 2002 (retrieved 23.4.2012). [9] W. Harrison, N. Hanebutte, P. Oman and J. Alves-Foss, “The MILS Architecture for a Secure Global Information Grid”. in CrossTalk 18 (10): pp. 20-24. http://www. crosstalkonline.org/storage/issue-archives/2005/200510/200510-Harrison.pdf, October 2005 (retrieved 23.4.2012). [10] L. Hathaway, “National Policy on the Use of the Advanced Encryption Standard (AES) to Protect National Security Systems and National Security Information”, http:// csrc.nist.gov/groups/ST/toolkit/documents/aes/CNSS15FS.pdf, June 2003 (retrieved 23.4.2012). [11] T. Imamura, B. Dillaway, and E. Simon, “XML Encryption Syntax and Processing, W3C Recommendation 10.12.2002”, in http://www.w3.org/TR/xmlenc-core/, World Wide Web Consortium, 2002 (retrieved 23.4.2012). [12] M. Kiviharju, Content-Based Information Security (CBIS): Definitions, Requirements and Cryptographic Architecture, Riihimäki: Defence Forces Technical Research Centre, 2010. [13] M. Kiviharju, “Towards Pervasive Cryptographic Access Control Models”, in Proc. SECRYPT 2012, in press. [14] J. Lamminmäki, “DR201R01: CBIS-skeema, Loppuraportti.” Final Report for Finnish Defence Forces, Insta DefSec, 8.12.2010. [15] S. McGovern, “Information Security Requirements for a Coalition Wide Area Network”, Thesis in Naval Postgraduate School, Monterey, California (June 2001), http://cisr.nps.edu/downloads/theses/01thesis_mcgovern.pdf, NPS/CISR, 2001, (retrieved 23.4.2012). [16] NIST-CSRC, “CSC-STD-004-85, Technical Rational Behind CSC-STD-003-85: Computer Security Requirements (Yellow Book)”, in http://csrc.nist.gov/publications/ secpubs/rainbow/std004.txt, CSRC, NIST, pp. 9-13, 25.6.1985 (retrieved 23.4.2012). [17] M. Pirretti, P. Traynor, P. McDaniel, and B. Waters, “Secure Attribute-Based Systems”, in Proc. Of CCS 2006, pp. 99-111, ACM, 2006. [18] J. Savoie, “A Strong three-factor authentication device: TrustedDAVE and the new Generic Content-Based Information Security (CBIS) architecture”, Technical Memorandum TM 2004-198, DRDC Ottawa, http://pubs.drdc.gc.ca/PDFS/unc32/ p522843.pdf, DRDC Canada, November 2004 (retrieved 23.4.2012). [19] C. Sperberg-McQueen et al., “Extensible Markup Language (XML)”, in http:// www.w3.org/XML/Overview.html, World Wide Web Consortium, September 2006 (retrieved 23.4.2012). [20] B. Thuraisingham, Building Trustworthy Semantic Webs, Boca Raton, FL: Auerbach Publications, 2008. [21] ibid. p. 118. [22] K. Poulsen, K. Zetter, “U.S. Intelligence Analyst Arrested in Wikileaks Video Probe”, in ‘Threat Level’ blog, http://www.wired.com/threatlevel/2010/06/leak/, Wired, 6.6.2010 (retrieved 23.4.2010).
Generation of Nonlinear Feedback Shift Registers with Special-Purpose Hardware Tomasz Rachwalik, Janusz Szmidt, Robert Wicik, Janusz Zabłocki Cryptology Division, Military Communication Institute, Zegrze, Poland, t.rachwalik@wil.waw.pl Abstract: The nonlinear feedback shift registers (NLFSR) are used as primitives in cryptographic algorithms. Their theory is not so complete as that of the linear feedback shift registers (LFSR). In general, it is not known how to construct NLFSRs with maximum period. The direct method is to search for such registers with suitable properties. We used the implementation of NLFSRs in Field Programmable Gate Arrays (FPGA) to perform a corresponding search. We also investigated local statistical properties of the binary sequences generated by NLFSRs of order 25 and 27. Keywords: Nonlinear feedback shift registers. Maximum period. Linear complexity. Hardware implementation. Randomness properties I. Introduction Feedback shift registers (FSR) sequences have been widely used in many areas of communication theory, as key stream generators in stream ciphers cryptosystems, pseudorandom number generators in many cryptographic primitive algorithms, and testing vectors in hardware design. Golomb’s book [5] is a pioneering one that discusses this type of sequences. A modern treatment of the subject is contained in Golomb and Gong [6]. The theory of linear feedback shift registers (LFSR) is understood quite well. In particular, it is known how to construct the LFSRs with maximum period; they correspond to primitive minimal polynomials over the binary field GF(2). The primitive LFSRs have a drawback as their linear complexity is equal to their order. In recent years, nonlinear feedback shift registers (NLFSR) have received much attention in designing numerous cryptographic algorithms such as stream ciphers and lightweight block ciphers to provide security in communication systems. In most cases, NLFSRs have much bigger linear complexity than LFSRs of the same order. However, not much is known about cyclic structures of NLFSRs; most of the known results are collected in Golomb’s fundamental book [5]. We used the implementation of NLFSRs in Field Programmable Gate Arrays (FPGA) to perform a search of NLFSRs of the order up to n = 27, the maximum
- Page 403 and 404: Chapter 4: Information Assurance &
- Page 405 and 406: Chapter 4: Information Assurance &
- Page 407 and 408: Chapter 4: Information Assurance &
- Page 409 and 410: Chapter 4: Information Assurance &
- Page 411 and 412: Chapter 4: Information Assurance &
- Page 413 and 414: Chapter 4: Information Assurance &
- Page 415 and 416: Methodology for Gathering Data Conc
- Page 417 and 418: Chapter 4: Information Assurance &
- Page 419 and 420: Chapter 4: Information Assurance &
- Page 421 and 422: Chapter 4: Information Assurance &
- Page 423 and 424: Chapter 4: Information Assurance &
- Page 425 and 426: Chapter 4: Information Assurance &
- Page 427 and 428: Chapter 4: Information Assurance &
- Page 429: Chapter 4: Information Assurance &
- Page 432 and 433: 432 Military Communications and Inf
- Page 434 and 435: 434 Military Communications and Inf
- Page 436 and 437: 436 Military Communications and Inf
- Page 439 and 440: On Multi-Level Secure Structured Co
- Page 441 and 442: Chapter 4: Information Assurance &
- Page 443 and 444: Chapter 4: Information Assurance &
- Page 445 and 446: Chapter 4: Information Assurance &
- Page 447 and 448: Chapter 4: Information Assurance &
- Page 449 and 450: Chapter 4: Information Assurance &
- Page 451 and 452: Chapter 4: Information Assurance &
- Page 453: Chapter 4: Information Assurance &
- Page 457 and 458: Chapter 4: Information Assurance &
- Page 459 and 460: Chapter 4: Information Assurance &
- Page 461 and 462: Chapter 4: Information Assurance &
- Page 463: Chapter 4: Information Assurance &
- Page 466 and 467: 466 Military Communications and Inf
- Page 468 and 469: 468 Military Communications and Inf
- Page 470 and 471: 470 Military Communications and Inf
- Page 472 and 473: 472 Military Communications and Inf
- Page 474 and 475: 474 Military Communications and Inf
- Page 476 and 477: 476 Military Communications and Inf
- Page 478 and 479: 478 Military Communications and Inf
- Page 480 and 481: 480 Military Communications and Inf
- Page 482 and 483: 482 Military Communications and Inf
- Page 485 and 486: Modern Usage of “Old” One-Time
- Page 487 and 488: Chapter 4: Information Assurance &
- Page 489 and 490: Chapter 4: Information Assurance &
- Page 491 and 492: Chapter 4: Information Assurance &
- Page 493 and 494: Chapter 4: Information Assurance &
- Page 495: Chapter 4: Information Assurance &
- Page 498 and 499: 498 Military Communications and Inf
- Page 500 and 501: 500 Military Communications and Inf
- Page 502 and 503: 502 Military Communications and Inf
Generation of Nonlinear Feedback Shift Registers<br />
with Special-Purpose Hardware<br />
Tomasz Rachwalik, Janusz Szmidt, Robert Wicik, Janusz Zabłocki<br />
Cryptology Division, <strong>Military</strong> Communication Institute, Zegrze, Pol<strong>and</strong>,<br />
t.rachwalik@wil.waw.pl<br />
Abstract: The nonlinear feedback shift registers (NLFSR) are used as primitives in cryptographic<br />
algorithms. Their theory is not so complete as that of the linear feedback shift registers (LFSR).<br />
In general, it is not known how to construct NLFSRs with maximum period. The direct method is to<br />
search for such registers with suitable properties. We used the implementation of NLFSRs in Field<br />
Programmable Gate Arrays (FPGA) to perform a corresponding search. We also investigated local<br />
statistical properties of the binary sequences generated by NLFSRs of order 25 <strong>and</strong> 27.<br />
Keywords: Nonlinear feedback shift registers. Maximum period. Linear complexity. Hardware implementation.<br />
R<strong>and</strong>omness properties<br />
I. Introduction<br />
Feedback shift registers (FSR) sequences have been widely used in many<br />
areas of communication theory, as key stream generators in stream ciphers cryptosystems,<br />
pseudor<strong>and</strong>om number generators in many cryptographic primitive<br />
algorithms, <strong>and</strong> testing vectors in hardware design. Golomb’s book [5] is a pioneering<br />
one that discusses this type of sequences. A modern treatment of the subject<br />
is contained in Golomb <strong>and</strong> Gong [6].<br />
The theory of linear feedback shift registers (LFSR) is understood quite well.<br />
In particular, it is known how to construct the LFSRs with maximum period;<br />
they correspond to primitive minimal polynomials over the binary field GF(2).<br />
The primitive LFSRs have a drawback as their linear complexity is equal to their<br />
order. In recent years, nonlinear feedback shift registers (NLFSR) have received much<br />
attention in designing numerous cryptographic algorithms such as stream ciphers<br />
<strong>and</strong> lightweight block ciphers to provide security in communication systems. In most<br />
cases, NLFSRs have much bigger linear complexity than LFSRs of the same order.<br />
However, not much is known about cyclic structures of NLFSRs; most of the known<br />
results are collected in Golomb’s fundamental book [5].<br />
We used the implementation of NLFSRs in Field Programmable Gate Arrays<br />
(FPGA) to perform a search of NLFSRs of the order up to n = 27, the maximum