Hu Xue-xian, Liu Wen-fen, Li Shi-qu. A Probabilistic Model of the Bilateral Stop/Go Generator[J]. Journal of Electronics & Information Technology, 2007, 29(12): 2974-2977. doi: 10.3724/SP.J.1146.2006.00702
Citation:
Hu Xue-xian, Liu Wen-fen, Li Shi-qu. A Probabilistic Model of the Bilateral Stop/Go Generator[J]. Journal of Electronics & Information Technology, 2007, 29(12): 2974-2977. doi: 10.3724/SP.J.1146.2006.00702
Hu Xue-xian, Liu Wen-fen, Li Shi-qu. A Probabilistic Model of the Bilateral Stop/Go Generator[J]. Journal of Electronics & Information Technology, 2007, 29(12): 2974-2977. doi: 10.3724/SP.J.1146.2006.00702
Citation:
Hu Xue-xian, Liu Wen-fen, Li Shi-qu. A Probabilistic Model of the Bilateral Stop/Go Generator[J]. Journal of Electronics & Information Technology, 2007, 29(12): 2974-2977. doi: 10.3724/SP.J.1146.2006.00702
The probabilistic models for the bilateral stop/go generator are established. The properties such as Markov property, ergodic property and stationarity of the internal state sequence are studied. It is proved that the distributions of 0 and 1 in the output sequence are imbalanced, which implies that this generator can not be used as keystream generator directly. The rate of coincidence between the output sequence and corresponding LFSR sequences, together with their first derivatives are analyzed. The limit properties of the output sequence are also considered.
Gollmann D and Chambers W G. Clock-controlled shift registers: A review[J].IEEE Journal on Selected Areas in Communications.1989, 7(4):525-533[2]Zeng K C, Yang C H and Rao T R N. Large primes in stream-cipher cryptography. Advances in Cryptology- AUSCRYPT 90(LNCS 453), Berlin, Springer-Verlag, 1990: 194-205.[3]Zeng K C, Yang C H, Wey D Y and Rao T R N. Pseudorandom bit generators in stream-cipher cryptography. IEEE Computer, 1991, 24(2): 8-17.[4]Golic J Dj and Menicocci R. Edit probability correlation attacks on stop-go clocked keystream generators. Journal of Cryptology, 2002, 15(16): 41-68.[5]李世取, 黄晓英, 刘文芬, 等. 密码学中的有关概率模型. 北京: 电子工业出版社, 2005: 169-173.[6]林元杰. 应用随机过程. 北京: 清华大学出版社, 2002: 78-116.[7]丁存生, 肖国镇. 流密码学及其应用. 北京: 国防工业出版社, 1994: 181-202.[8]胡迪鹤. 随机过程:基础、理论、应用(第二版). 武汉: 武汉大学出版社, 2005: 248-252.