Stream ciphers and number theory /

This book is almost entirely concerned with stream ciphers, concentrating on a particular mathematical model for such ciphers which are called <IT>additive natural stream ciphers</IT>. These ciphers use a <IT>natural sequence generator</IT> to produce a periodic keystream. Fu...

Full description

Saved in:
Bibliographic Details
Main Authors: Cusick, Thomas W., 1943- (Author)
Corporate Authors: Elsevier Science & Technology.
Group Author: Ding, C. (Cunsheng), 1962-; Renvall, Ari, 1963-
Published: Elsevier,
Publisher Address: Amsterdam :
Publication Dates: 1998.
Literature type: eBook
Language: English
Series: North-Holland mathematical library ; v. 55
Subjects:
Online Access: http://www.sciencedirect.com/science/bookseries/09246509/55
Summary: This book is almost entirely concerned with stream ciphers, concentrating on a particular mathematical model for such ciphers which are called <IT>additive natural stream ciphers</IT>. These ciphers use a <IT>natural sequence generator</IT> to produce a periodic keystream. Full definitions of these concepts are given in Chapter 2. This book focuses on keystream sequences which can be analysed using number theory. It turns out that a great deal of information can be deducted about the cryptographic properties of many classes of sequences by applying the terminology and theorems of number theory. These connections can be explicitly made by describing three kinds of <IT>bridges</IT> between stream ciphering problems and number theory problems. A detailed summary of these ideas is given in the introductory Chapter 1. Many results in the book are new, and over seventy percent of these results described in this book are based on recent research results.
Carrier Form: 1 online resource (xiv, 431 pages) : illustrations.
Bibliography: Includes bibliographical references (pages 401-428) and index.
ISBN: 9780444828736
0444828737
9780080541846
0080541844
Index Number: QA241
CLC: O156
Contents: Section Headings only. Preface. Introduction. Stream Ciphers. Primes, Primitive Roots and Sequences. Cyclotomy and Cryptographic Functions. Special Primes and Sequences. Difference Sets and Cryptographic Functions. Difference Sets and Sequences. Binary Cyclotomic Generators. Analysis of Cyclotomic Generators of Order 2. Nonbinary Cyclotomic Generators. Generators Based on Permutations. Quadratic Partitions and Cryptography. Group Characters and Cryptography. <IT>P</IT>-Adic Numbers, Class Number and Sequences. Prime Ciphering Algorithms. Cryptographic Problems and Philosophies. A. More About Cyclotomic Numbers. B. Cyclotomic Formulae of Orders 6,8 and 10, C. Finding Practical Primes. D. List of Research Problems. E. Exercises. F. List of Mathematical Symbols. Bibliography. Index.