Amparo Fúster-Sabater - Academia.edu (original) (raw)

Papers by Amparo Fúster-Sabater

Research paper thumbnail of Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator

Open Mathematics, 2018

Decimation-based sequence generators are a class of non-linear cryptographic generators designed ... more Decimation-based sequence generators are a class of non-linear cryptographic generators designed to be used in hardware implementations. An inherent characteristic of such generators is that their output sequences are interleaved sequences. This pro table characteristic can be used in the cryptanalysis of those generators. In this work, emphasis is on the most representative decimation-based generator, the shrinking generator, which has been cryptanalyzed just by solving linear equation systems. Compared with previous cryptanalysis, computational complexity and intercepted sequence requirements are dramatically reduced. Although irregularly decimated generators have been conceived and designed as non-linear sequence generators, in practice they can be easily analyzed in terms of simple linear structures.

Research paper thumbnail of Randomness study of the concatenation of generalized sequences

Logic Journal of the IGPL, Feb 18, 2022

Research paper thumbnail of Linearization of Cryptographic Sequences

Advances in intelligent systems and computing, Apr 28, 2019

The generalized self-shrinking generator (or generalized generator) produces binary sequences (ge... more The generalized self-shrinking generator (or generalized generator) produces binary sequences (generalized sequences) with good cryptographic properties. On the other hand, the binomial sequences can be obtained considering infinite successions of binomial coefficients modulo 2. It is possible to see that the generalized sequences can be computed as a finite binary sum of binomial sequences. Besides, the cryptographic parameters of the generalized sequences can be studied in terms of the binomial sequences.

Research paper thumbnail of Cryptography with Shrinking Generators: Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation

This book offers a broad survey of all information made public - from 1993 until today - on keyst... more This book offers a broad survey of all information made public - from 1993 until today - on keystream sequence generators based on irregular decimation, which are referred to as shrinking generators. Starting with an overview of cryptography, it describes each type of generator - shrinking, self-shrinking, modified self-shrinking, generalized self-shrinking and the DECIM algorithm - with examples and references. Further, the book discusses several attacks on these generators and applications. It concludes by demonstrating how the output sequences can be modeled by means of different families of one-dimensional cellular automata, rendering the generators vulnerable to attacks. Intended for researchers and graduate students, the book will hopefully inspire them to search for more details on this family of generators and to address the open problems in this field.

Research paper thumbnail of Modelling the MSSG in Terms of Cellular Automata

Lecture Notes in Computer Science, 2016

The modified self-shrinking generator is a non-linear cryptographic sequence generator designed t... more The modified self-shrinking generator is a non-linear cryptographic sequence generator designed to be used in hardware implementations. In this work, the output sequence of such a generator is obtained as one of the output sequences of a linear model based on Cellular Automata. Although irregularly decimated generators have been conceived and designed as non-linear sequence generators, in practice they can be easy modelled in terms of simple linear structures.

Research paper thumbnail of A Simple Linearisation of the Self-shrinking Generator

Research paper thumbnail of Computing the Linear Complexity in a Class of Cryptographic Sequences

Lecture Notes in Computer Science, 2018

In this work, we present a method of computing the linear complexity of the sequences produced by... more In this work, we present a method of computing the linear complexity of the sequences produced by the cryptographic sequence generator known as generalized self-shrinking generator. This approach is based on the comparison of different shifted versions of a single PN-sequence. Just the analysis of binary digits in these shifted sequences allows one to determine the linear complexity of those generalized sequences. The method is simple, direct and efficient. Furthermore, the concept of linear recurrence relationship and the rows of the Sierpinski’s triangle are the basic tools in this computation.

Research paper thumbnail of Keystream Generators Based on Irregular Decimation

SpringerBriefs in Mathematics, 2019

In this chapter, we study the definition and the principal characteristics of the main keystream ... more In this chapter, we study the definition and the principal characteristics of the main keystream generators based on irregular decimation: the shrinking generator, the self-shrinking generator, the modified self-shrinking generator and the generalized self-shrinking generator.

Research paper thumbnail of Linear Models for the Self-Shrinking Generator Based on CA

J. Cell. Autom., 2016

The self-shrinking generator is a non-linear cryptographic sequence generator designed to be used... more The self-shrinking generator is a non-linear cryptographic sequence generator designed to be used in stream cipher applications. In this work, its output sequence, the self-shrunken sequence, is computed as one of the output sequences of a linear model based on Cellular Automata. Such Automata are uniform, null, one-dimensional and use rules 102 or 60 for their computations. The linearity of these structures can be advantageous exploited to recover the complete selfshrunken sequence from a number of intercepted bits. Indeed, a Cellular Automata-based reconstruction procedure that is deterministic, does not need the knowledge of the LFSR characteristic polynomial and is performed exclusively by means of XOR operations has been proposed. © 2016 Old City Publishing, Inc.1119521

Research paper thumbnail of Linear Models for High-Complexity Sequences

Computational Science and Its Applications – ICCSA 2017, 2017

Different binary sequence generators produce sequences whose period is a power of 2. Although the... more Different binary sequence generators produce sequences whose period is a power of 2. Although these sequences exhibit good cryptographic properties, in this work it is proved that such sequences can be obtained as output sequences from simple linear structures. More precisely, every one of these sequences is a particular solution of a linear difference equation with binary coefficients. This fact allows one to analyze the structural properties of the sequences with such a period from the point of view of the linear difference equations. In addition, a new application of the Pascal’s triangle to the cryptographic sequences has been introduced. In fact, it is shown that all these binary sequences can be obtained by XORing a finite number of binomial sequences that correspond to the diagonals of the Pascal’s triangle reduced modulo 2.

Research paper thumbnail of Preliminary Analysis of Interleaving PN-Sequences

Computational Science and Its Applications – ICCSA 2021, 2021

Research paper thumbnail of Modelling Through Linear Cellular Automata

SpringerBriefs in Mathematics, 2019

The irregular decimation was introduced to break the linearity of the PN-sequences. However, in t... more The irregular decimation was introduced to break the linearity of the PN-sequences. However, in this chapter we will see that there exist linear structures that describe the behaviour of the shrinking generators, designed as non-linear. The inherent linearity of these structures can be used to cryptanalyse such generators as described in Chap. 4.

Research paper thumbnail of Discrete linear models for the generalized self-shrunken sequences

Finite Fields and Their Applications, 2017

Research paper thumbnail of A Simple Linearisation of the Self-shrinking Generator

Lecture Notes in Computer Science, 2015

Research paper thumbnail of Article EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen

Research paper thumbnail of Optimal modes of operation of pseudorandom sequence generators based on DLFSRs

Logic Journal of IGPL, 2016

Research paper thumbnail of Generation of pseudorandom binary sequences by means of linear feedback shift registers (LFSRs) with dynamic feedback

Mathematical and Computer Modelling, 2013

In 2002, Mita et al. [1] proposed a pseudorandom bit generator based on a dynamic linear feedback... more In 2002, Mita et al. [1] proposed a pseudorandom bit generator based on a dynamic linear feedback shift register (DLFSR) for cryptographic application. The particular topology there proposed is now analyzed, allowing us to extend the results to more general cases. Maximum period and linear span values are obtained for the generated sequences, while several estimations for autocorrelation and cross-correlation of such sequences are also presented. Furthermore, the sequences produced by DLFSRs can be considered as interleaved sequences. This fact allows us to apply the general interleaved sequence model proposed by Gong and consequently simplify their study. Finally, several remarks are stated regarding DLFSR utilization for cryptographic or code division multiple access (CDMA) applications.

Research paper thumbnail of Reducing the Security Margin Against a Differential Attack in the TinyJambu Cryptosystem

Lecture notes in networks and systems, Dec 31, 2022

Research paper thumbnail of On the Use of Cellular Automata in Symmetric Cryptography

Acta Applicandae Mathematicae, Aug 15, 2006

In this work, pseudorandom sequence generators based on finite fields have been analyzed from the... more In this work, pseudorandom sequence generators based on finite fields have been analyzed from the point of view of their cryptographic application. In fact, a class of nonlinear sequence generators has been modelled in terms of linear cellular automata. The algorithm that converts the given generator into a linear model based on automata is very simple and is based on the concatenation of a basic structure. Once the generator has been linearized, a cryptanalytic attack that exploits the weaknesses of such a model has been developed. Linear cellular structures easily model sequence generators with application in stream cipher cryptography.

Research paper thumbnail of Deterministic Cryptanalysis of some Stream Ciphers

Research paper thumbnail of Linearity in decimation-based generators: an improved cryptanalysis on the shrinking generator

Open Mathematics, 2018

Decimation-based sequence generators are a class of non-linear cryptographic generators designed ... more Decimation-based sequence generators are a class of non-linear cryptographic generators designed to be used in hardware implementations. An inherent characteristic of such generators is that their output sequences are interleaved sequences. This pro table characteristic can be used in the cryptanalysis of those generators. In this work, emphasis is on the most representative decimation-based generator, the shrinking generator, which has been cryptanalyzed just by solving linear equation systems. Compared with previous cryptanalysis, computational complexity and intercepted sequence requirements are dramatically reduced. Although irregularly decimated generators have been conceived and designed as non-linear sequence generators, in practice they can be easily analyzed in terms of simple linear structures.

Research paper thumbnail of Randomness study of the concatenation of generalized sequences

Logic Journal of the IGPL, Feb 18, 2022

Research paper thumbnail of Linearization of Cryptographic Sequences

Advances in intelligent systems and computing, Apr 28, 2019

The generalized self-shrinking generator (or generalized generator) produces binary sequences (ge... more The generalized self-shrinking generator (or generalized generator) produces binary sequences (generalized sequences) with good cryptographic properties. On the other hand, the binomial sequences can be obtained considering infinite successions of binomial coefficients modulo 2. It is possible to see that the generalized sequences can be computed as a finite binary sum of binomial sequences. Besides, the cryptographic parameters of the generalized sequences can be studied in terms of the binomial sequences.

Research paper thumbnail of Cryptography with Shrinking Generators: Fundamentals and Applications of Keystream Sequence Generators Based on Irregular Decimation

This book offers a broad survey of all information made public - from 1993 until today - on keyst... more This book offers a broad survey of all information made public - from 1993 until today - on keystream sequence generators based on irregular decimation, which are referred to as shrinking generators. Starting with an overview of cryptography, it describes each type of generator - shrinking, self-shrinking, modified self-shrinking, generalized self-shrinking and the DECIM algorithm - with examples and references. Further, the book discusses several attacks on these generators and applications. It concludes by demonstrating how the output sequences can be modeled by means of different families of one-dimensional cellular automata, rendering the generators vulnerable to attacks. Intended for researchers and graduate students, the book will hopefully inspire them to search for more details on this family of generators and to address the open problems in this field.

Research paper thumbnail of Modelling the MSSG in Terms of Cellular Automata

Lecture Notes in Computer Science, 2016

The modified self-shrinking generator is a non-linear cryptographic sequence generator designed t... more The modified self-shrinking generator is a non-linear cryptographic sequence generator designed to be used in hardware implementations. In this work, the output sequence of such a generator is obtained as one of the output sequences of a linear model based on Cellular Automata. Although irregularly decimated generators have been conceived and designed as non-linear sequence generators, in practice they can be easy modelled in terms of simple linear structures.

Research paper thumbnail of A Simple Linearisation of the Self-shrinking Generator

Research paper thumbnail of Computing the Linear Complexity in a Class of Cryptographic Sequences

Lecture Notes in Computer Science, 2018

In this work, we present a method of computing the linear complexity of the sequences produced by... more In this work, we present a method of computing the linear complexity of the sequences produced by the cryptographic sequence generator known as generalized self-shrinking generator. This approach is based on the comparison of different shifted versions of a single PN-sequence. Just the analysis of binary digits in these shifted sequences allows one to determine the linear complexity of those generalized sequences. The method is simple, direct and efficient. Furthermore, the concept of linear recurrence relationship and the rows of the Sierpinski’s triangle are the basic tools in this computation.

Research paper thumbnail of Keystream Generators Based on Irregular Decimation

SpringerBriefs in Mathematics, 2019

In this chapter, we study the definition and the principal characteristics of the main keystream ... more In this chapter, we study the definition and the principal characteristics of the main keystream generators based on irregular decimation: the shrinking generator, the self-shrinking generator, the modified self-shrinking generator and the generalized self-shrinking generator.

Research paper thumbnail of Linear Models for the Self-Shrinking Generator Based on CA

J. Cell. Autom., 2016

The self-shrinking generator is a non-linear cryptographic sequence generator designed to be used... more The self-shrinking generator is a non-linear cryptographic sequence generator designed to be used in stream cipher applications. In this work, its output sequence, the self-shrunken sequence, is computed as one of the output sequences of a linear model based on Cellular Automata. Such Automata are uniform, null, one-dimensional and use rules 102 or 60 for their computations. The linearity of these structures can be advantageous exploited to recover the complete selfshrunken sequence from a number of intercepted bits. Indeed, a Cellular Automata-based reconstruction procedure that is deterministic, does not need the knowledge of the LFSR characteristic polynomial and is performed exclusively by means of XOR operations has been proposed. © 2016 Old City Publishing, Inc.1119521

Research paper thumbnail of Linear Models for High-Complexity Sequences

Computational Science and Its Applications – ICCSA 2017, 2017

Different binary sequence generators produce sequences whose period is a power of 2. Although the... more Different binary sequence generators produce sequences whose period is a power of 2. Although these sequences exhibit good cryptographic properties, in this work it is proved that such sequences can be obtained as output sequences from simple linear structures. More precisely, every one of these sequences is a particular solution of a linear difference equation with binary coefficients. This fact allows one to analyze the structural properties of the sequences with such a period from the point of view of the linear difference equations. In addition, a new application of the Pascal’s triangle to the cryptographic sequences has been introduced. In fact, it is shown that all these binary sequences can be obtained by XORing a finite number of binomial sequences that correspond to the diagonals of the Pascal’s triangle reduced modulo 2.

Research paper thumbnail of Preliminary Analysis of Interleaving PN-Sequences

Computational Science and Its Applications – ICCSA 2021, 2021

Research paper thumbnail of Modelling Through Linear Cellular Automata

SpringerBriefs in Mathematics, 2019

The irregular decimation was introduced to break the linearity of the PN-sequences. However, in t... more The irregular decimation was introduced to break the linearity of the PN-sequences. However, in this chapter we will see that there exist linear structures that describe the behaviour of the shrinking generators, designed as non-linear. The inherent linearity of these structures can be used to cryptanalyse such generators as described in Chap. 4.

Research paper thumbnail of Discrete linear models for the generalized self-shrunken sequences

Finite Fields and Their Applications, 2017

Research paper thumbnail of A Simple Linearisation of the Self-shrinking Generator

Lecture Notes in Computer Science, 2015

Research paper thumbnail of Article EPCGen2 Pseudorandom Number Generators: Analysis of J3Gen

Research paper thumbnail of Optimal modes of operation of pseudorandom sequence generators based on DLFSRs

Logic Journal of IGPL, 2016

Research paper thumbnail of Generation of pseudorandom binary sequences by means of linear feedback shift registers (LFSRs) with dynamic feedback

Mathematical and Computer Modelling, 2013

In 2002, Mita et al. [1] proposed a pseudorandom bit generator based on a dynamic linear feedback... more In 2002, Mita et al. [1] proposed a pseudorandom bit generator based on a dynamic linear feedback shift register (DLFSR) for cryptographic application. The particular topology there proposed is now analyzed, allowing us to extend the results to more general cases. Maximum period and linear span values are obtained for the generated sequences, while several estimations for autocorrelation and cross-correlation of such sequences are also presented. Furthermore, the sequences produced by DLFSRs can be considered as interleaved sequences. This fact allows us to apply the general interleaved sequence model proposed by Gong and consequently simplify their study. Finally, several remarks are stated regarding DLFSR utilization for cryptographic or code division multiple access (CDMA) applications.

Research paper thumbnail of Reducing the Security Margin Against a Differential Attack in the TinyJambu Cryptosystem

Lecture notes in networks and systems, Dec 31, 2022

Research paper thumbnail of On the Use of Cellular Automata in Symmetric Cryptography

Acta Applicandae Mathematicae, Aug 15, 2006

In this work, pseudorandom sequence generators based on finite fields have been analyzed from the... more In this work, pseudorandom sequence generators based on finite fields have been analyzed from the point of view of their cryptographic application. In fact, a class of nonlinear sequence generators has been modelled in terms of linear cellular automata. The algorithm that converts the given generator into a linear model based on automata is very simple and is based on the concatenation of a basic structure. Once the generator has been linearized, a cryptanalytic attack that exploits the weaknesses of such a model has been developed. Linear cellular structures easily model sequence generators with application in stream cipher cryptography.

Research paper thumbnail of Deterministic Cryptanalysis of some Stream Ciphers