• Media type: E-Book
  • Title: The stability theory of stream ciphers
  • Contributor: Ding, Cunsheng [Author]; Xiao, Guozhen [Author]; Shan, Weijuan [Author]
  • Published: Berlin [u.a.]: Springer, 1991
    Online-Ausg., Berlin [u.a.]: Springer, 2006
  • Published in: Lecture notes in computer science ; 56100
  • Extent: Online-Ressource (IX, 187 S.)
  • Language: English
  • DOI: 10.1007/3-540-54973-0
  • ISBN: 9783540466260
  • Identifier:
  • RVK notation: SS 4800 : Lecture notes in computer science
  • Keywords: Stromchiffre
  • Reproduction series: Springer lecture notes archive
  • Type of reproduction: Online-Ausg.
  • Place of reproduction: Berlin [u.a.]: Springer, 2006
  • Origination:
  • Footnote: Literaturverz. S. [180] - 187
  • Description: Stream ciphers -- The BAA attacks on several classes of stream ciphers -- Measure indexes on the security of stream ciphers -- The stability of linear complexity of sequences -- The period stability of sequences -- Summary and open problems.

    Secure message transmission is of extreme importance in today's information-based society. Stream encryption is a practically important means to this end. This monograph is devoted to a new aspect of stream ciphers, namely the stability theory of stream ciphers, with the purpose of developing bounds on complexity which can form part of the basis for a general theory of data security and of stabilizing stream-cipher systems. The approach adopted in this monograph is new. The topic is treated by introducing measure indexes on the security of stream ciphers, developing lower bounds on these indexes, and establishing connections among them. The treatment involves the stability of boolean functions, the stability of linear complexity of key streams, the period stability of key streams, and the stability of source codes. Misleading ideas about stream ciphers are exposed and new viewpoints presented. The numerous measure indexes and bounds on them that are introduced here, the approach based on spectrum techniques, andthe ten open problems presented will all be useful to the reader concerned with analyzing and designing stream ciphers for securing data.