Question

In: Advanced Math

In practice, an LFSR sequence would not be used as keystream for a stream cipher, due...

  1. In practice, an LFSR sequence would not be used as keystream for a stream cipher, due to the linear complexity. Answer the following questions about linear complexity.
  1. What is the linear complexity of a maximal length LFSR output sequence?
  2. Describe one method using LFSRs to produce a binary output sequence but with increased linear complexity. Draw a diagram to illustrate your construction.

Solutions

Expert Solution

a.

Linear complexity is also called linear span.If an LFSR sequence of n stages has the maximal period ,then it is called a maximal length sequence,shortened as m - sequence.

b.

One standed wa is as follows.Let, n primitive LFSR with lengths with ,

now we take the GCD

and take a nonlinear boolean function

with

for that we have a output of linear complexity

evaluted over the integers, where output of LFSR is input as the variable of the bolean function.this is called the combination generator,

example.


Related Solutions

List the primitive operations used in the RC4 stream cipher algorithm for A) Key Stream Generation...
List the primitive operations used in the RC4 stream cipher algorithm for A) Key Stream Generation B) Bit Stream Encryption
Stream Cipher. A message is encoded by exclusive-or’ing each bit with a random bit stream. (In...
Stream Cipher. A message is encoded by exclusive-or’ing each bit with a random bit stream. (In exclusive or, 0⊕0 = 0, 1⊕0 = 1, 0⊕1 = 1, and 1⊕1 = 0.) a. Recover the original message from the random stream and encrypted stream, by filling in the blanks in the “Recovered” and “ASCII” rows. (In the ASCII column, interpret the byte as an ASCII character and write the value in that row.) Message: ? ? ? ? ? ? ?...
Problem 1. Write two computer programs to simulate a Unicode stream cipher that consists of both...
Problem 1. Write two computer programs to simulate a Unicode stream cipher that consists of both encryption and decryption algorithms. The encryption program accepts inputs from an existing text file, called “letter.txt.” The encryption program produces an output ciphertext file, called “secret” The decryption program takes “secret” as input and decrypts it into a plaintext, called “message.txt.” - The random “seed” must be known, but be kept secure, by the pseudorandom number generators in both encryption and decryption programs. Note...
A sequence detector is monitoring a serial input stream looking for either 0101 or 0110. The...
A sequence detector is monitoring a serial input stream looking for either 0101 or 0110. The output is two consecutive cycles of 1’s, with the first of the two being asserted in the same cycle as the last input matching the sequence; in other words, it has to be a Mealy machine. Draw the state diagram for this sequence detector Assign states and create the state table, showing next states and output as a function of current state and input....
If a Vigenere cipher uses the keyword CATS, what is the key used and what is...
If a Vigenere cipher uses the keyword CATS, what is the key used and what is the ciphertext that corresponds to the plaintext CATSCANS
Think about a bacterial cell entered the blood stream of a human. State the probable sequence...
Think about a bacterial cell entered the blood stream of a human. State the probable sequence of immunological interactions and responses that will occur in both innate and adaptive immune system and support your answer with molecules, receptors, pathways and cells involved. (200-300 words)
Caesar Cipher in Java Problem? Objective Practice the cumulative sum and char data type Problem You...
Caesar Cipher in Java Problem? Objective Practice the cumulative sum and char data type Problem You want to create an app to encrypt the text messages that you send to your friends. Once your friend gets the message, the message should be decrypted so that your friend understands it. To implement this app Caesar cipher algorithm should be used. Caesar Cipher text is formed by rotating each letter by a given amount. For example, if you rotate the letter ‘A’...
Laboratory 11B: Methyl Orange 1) What changes to the synthetic sequence used for methyl orange would...
Laboratory 11B: Methyl Orange 1) What changes to the synthetic sequence used for methyl orange would need to be made to generate FD&C Orange #1 (see lab manual for the structure). (Some structure drawings will be helpful when answering this question). 2) Some fabrics stained strongly with methyl orange while others stained poorly. Using one of the strongly stained fabrics as an example, explain what features of that material result in it being strongly stained. 3) Explain why methyl orange...
Write sequence of the DNA strand that would be complementary to the DNA sequence shown below....
Write sequence of the DNA strand that would be complementary to the DNA sequence shown below. Label the 3' and 5' ends ofthe new strand. 3'   T A C C G A T G G    5'
Julius Caesar used one of the earliest known cipher systems to communicate with Cicero in Rome...
Julius Caesar used one of the earliest known cipher systems to communicate with Cicero in Rome while he was conquering Europe. Caesar knew that there was a very high risk of ambush or spies when sending messages; therefore, he developed a cryptographic system now known as the Caesar cipher. Primary Task Response: Please provide a detailed response to the below to include specific details and examples. What is the Caesar ROT3 Cipher? How does it work? Although the Caesar cipher...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT