Question

In: Advanced Math

In practice, an LFSR sequence would not be used as keystream for a stream cipher, due...

  1. In practice, an LFSR sequence would not be used as keystream for a stream cipher, due to the linear complexity. Answer the following questions about linear complexity.
  1. What is the linear complexity of a maximal length LFSR output sequence?
  2. Describe one method using LFSRs to produce a binary output sequence but with increased linear complexity. Draw a diagram to illustrate your construction.

Solutions

Expert Solution

a.

Linear complexity is also called linear span.If an LFSR sequence of n stages has the maximal period ,then it is called a maximal length sequence,shortened as m - sequence.

b.

One standed wa is as follows.Let, n primitive LFSR with lengths with ,

now we take the GCD

and take a nonlinear boolean function

with

for that we have a output of linear complexity

evaluted over the integers, where output of LFSR is input as the variable of the bolean function.this is called the combination generator,

example.


Related Solutions

List the primitive operations used in the RC4 stream cipher algorithm for A) Key Stream Generation...
List the primitive operations used in the RC4 stream cipher algorithm for A) Key Stream Generation B) Bit Stream Encryption
Stream Cipher. A message is encoded by exclusive-or’ing each bit with a random bit stream. (In...
Stream Cipher. A message is encoded by exclusive-or’ing each bit with a random bit stream. (In exclusive or, 0⊕0 = 0, 1⊕0 = 1, 0⊕1 = 1, and 1⊕1 = 0.) a. Recover the original message from the random stream and encrypted stream, by filling in the blanks in the “Recovered” and “ASCII” rows. (In the ASCII column, interpret the byte as an ASCII character and write the value in that row.) Message: ? ? ? ? ? ? ?...
Problem 1. Write two computer programs to simulate a Unicode stream cipher that consists of both...
Problem 1. Write two computer programs to simulate a Unicode stream cipher that consists of both encryption and decryption algorithms. The encryption program accepts inputs from an existing text file, called “letter.txt.” The encryption program produces an output ciphertext file, called “secret” The decryption program takes “secret” as input and decrypts it into a plaintext, called “message.txt.” - The random “seed” must be known, but be kept secure, by the pseudorandom number generators in both encryption and decryption programs. Note...
A sequence detector is monitoring a serial input stream looking for either 0101 or 0110. The...
A sequence detector is monitoring a serial input stream looking for either 0101 or 0110. The output is two consecutive cycles of 1’s, with the first of the two being asserted in the same cycle as the last input matching the sequence; in other words, it has to be a Mealy machine. Draw the state diagram for this sequence detector Assign states and create the state table, showing next states and output as a function of current state and input....
If a Vigenere cipher uses the keyword CATS, what is the key used and what is...
If a Vigenere cipher uses the keyword CATS, what is the key used and what is the ciphertext that corresponds to the plaintext CATSCANS
Think about a bacterial cell entered the blood stream of a human. State the probable sequence...
Think about a bacterial cell entered the blood stream of a human. State the probable sequence of immunological interactions and responses that will occur in both innate and adaptive immune system and support your answer with molecules, receptors, pathways and cells involved. (200-300 words)
Caesar Cipher in Java Problem? Objective Practice the cumulative sum and char data type Problem You...
Caesar Cipher in Java Problem? Objective Practice the cumulative sum and char data type Problem You want to create an app to encrypt the text messages that you send to your friends. Once your friend gets the message, the message should be decrypted so that your friend understands it. To implement this app Caesar cipher algorithm should be used. Caesar Cipher text is formed by rotating each letter by a given amount. For example, if you rotate the letter ‘A’...
Laboratory 11B: Methyl Orange 1) What changes to the synthetic sequence used for methyl orange would...
Laboratory 11B: Methyl Orange 1) What changes to the synthetic sequence used for methyl orange would need to be made to generate FD&C Orange #1 (see lab manual for the structure). (Some structure drawings will be helpful when answering this question). 2) Some fabrics stained strongly with methyl orange while others stained poorly. Using one of the strongly stained fabrics as an example, explain what features of that material result in it being strongly stained. 3) Explain why methyl orange...
Write sequence of the DNA strand that would be complementary to the DNA sequence shown below....
Write sequence of the DNA strand that would be complementary to the DNA sequence shown below. Label the 3' and 5' ends ofthe new strand. 3'   T A C C G A T G G    5'
A small village is located near a stream which is to be used as the source...
A small village is located near a stream which is to be used as the source of water supply for the community. The minimum flow in the stream is 550 m3/h. The population analysis reveals that the population is expected to increase linearly from a population of 10,000 in 2008 to 30,000 in 2058. The water consumption of the community is estimated to reach an annual average demand of 300 L/capita/day, a maximum daily demand of 1.8 times the annual...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT