Professional Documents
Culture Documents
Ergasia Kryptografias
Ergasia Kryptografias
: . , .
filter generator. :
: 5 bits (K 1 , K 2 , K 3 , K 4 , K 5 )
IV: 5 bits (IV1 , IV2 , IV3 , IV4 , IV5 )
: 1 bit/clock cycle
: 10 bits
( 1)
xt = (xt ,1 , xt , 2 , L, xt ,10 ) t.
f ( xt ,1 , xt , 2 ,L , xt ,10 ) = xt ,1 + xt ,8
g .
z t = g (xt ,1 , xt , 2 ,L , xt ,10 ) = xt ,1 + xt , 2 xt , 4 xt ,5 xt ,6 xt ,8 xt ,9
( 2)
IV. :
x0 = (x0,1 , x0, 2 , x0,3 , x0, 4 , x0,5 , x0, 6 , x0, 7 , x0,8 , x0,9 , x0,10 ) = (K1 , K 2 , K 3 , K 4 , K 5 , IV1 , IV2 , IV3 , IV4 , IV5 )
20
.
xt +1 = (xt +1,1 , xt +1, 2 ,L, xt +1,10 ) = (xt , 2 ,L, xt ,10 , f ( xt ,1 , xt , 2 ,L, xt ,10 ) + zt ),0 t 19
t>19 .
. .
.
1.
2.
3.
4. g ( Walsh
transform)
5. correlation immunity g (
Walsh transform)
6. g (
Walsh transform)
1.
(
, )
2. C.
3. .
20 .