Research Article
BibTex RIS Cite
Year 2021, Volume: 6 Issue: 2, 91 - 109, 31.08.2021
https://doi.org/10.30931/jetas.931101

Abstract

References

  • [1] Schneier, B., “Applied cryptography-protocols, algorithms and source code in C”, John Wiley & Sounds, Inc, New York, Second Edition, (1996),.
  • [2] Menezes, A. J., Oorschot, P. C. V., Vanstone, S. A., “Handbook of applied cryptography” (1997) by CRC Press LLC.
  • [3] Gutub, A. A.-A., Al-Haidari, F., Al-Kahsah, K. M., Hamodi, J. “e-Text watermarking: utilizing “Kashida” extensions in Arabic language electronic writing”, J. Emerg. Technol. Web Intell. 2(1) (2010) : 48‑55.
  • [4] Gutub, A., Al-Qurashi, A., “Secure shares generation via m-blocks partitioning for counting-based secret sharing”, J. Eng. Res. 8(3) (2020) : 91‑117.
  • [5] George, M., Alfke, P., “Linear feedback shift registers in virtex devices (application note)”, http://www.xilinx.com/bvdocs/appnotes/xapp210.pdf.
  • [6] Goresky, M., Klapper, A., “Fibonacci and galois representations of feedback withcarry shift registers”, IEEE Transactions on Information Theory, 48(11) (2002) : 2826-2836.
  • [7] Stackoverflow, “Galois vs Fibonacci LFSR, more computer-friendly but what else?”, [online], nov 2011.
  • [8] Lv, Y., Tong, X., “A novel method of chaotic image encryption based on LFSR”, in 2009 International Conference on Management and Service Science, Beijing, China, sept. (2009) : 1‑4. doi: 10.1109/ICMSS.2009.5302775.
  • [9] Ayoup, A. M., Hussein, A. H., Attia, M. A. A., “Efficient selective image encryption”, Multimed. Tools Appl. 75(24) (2016): 17171‑17186.
  • [10] Kareem Jumaa, N., “Digital Image Encryption using AES and Random Number Generator”, Iraqi J. Electr. Electron. Eng. 14(1) (2018) : 80‑89.
  • [11] Naim, M., Ali Pacha, A., Serief, C., “A novel satellite image encryption algorithm based on hyperchaotic systems and Josephus problem”, Adv. Space Res. 67(7) (2021) : 2077‑2103.
  • [12] Golomb, S. W., “Shift register sequences”, Aegean Park Press, Laguna Hills, CA, (1982).
  • [13] Nyathi, J., Delgado-Frias, J. G., Lowe, J., “A high-performance, hybrid wave-pipelined linear feedback shift register with skew tolerant clocks,” 46th IEEE Midwest Symposium on Circuits and Systems, Cairo, Egypt, In Press, Dec. (2003).
  • [14] Mirella, A. M., Stratulat, M., “Study of software implementation for linear feedback shift register based on 8th degree irreducible polynomials”, International Journal Of Computers 8 (2014) : 46-55.
  • [15] Devaney, R. L., “A first course in chaotic dynamical systems theory and experiment”, New York: Westview Press, 1992. Aug 09, 2021. [online]: http://search.ebscohost.com/ login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=421133.
  • [16] Gleick, J., “Chaos: Making a New Science”, Albin Michel edition, (1987).
  • [17] Al-Roithy, B. O., Gutub, A. A., “Trustworthy image security via involving binary and chaotic gravitational searching within PRNG selections”, Int. J. Comput. Sci. Netw. Secur. 20(12) (2020) : 167‑176.
  • [18] Al-Qurashi, A., Gutub, A., “Reliable secret key generation for counting-based secret sharing”, J. Comput. Sci. Comput. Math. 8(4) (2018) 87‑101.
  • [19] Knuth, D.E., “The art of computer programming”, Addison-Wesley, Reading, MA, third edition, (1998).
  • [20] Berbain, C., “Analysis and design of stream algorithm Analysis and design of stream algorithm - in French language”, PhD thesis, University Paris 7. Diderot, supported on 10.2007, (2007).
  • [21] Gutub, A., Al-Shaarani, F., “Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons”, Arab. J. Sci. Eng. 45(4) (2020) : 2631‑2644.
  • [22] AlKhodaidi, T., Gutub, A., “Refining image steganography distribution for higher security multimedia counting-based secret-sharing”, Multimed. Tools Appl. 80(1) (2021) : 1143‑1173.
  • [23] Chen, G., Mao, Y., Chui, C. K., “A symmetric image encryption scheme based on 3D chaotic cat maps”, Chaos Solitons Fractals 21(3) (2004) : 749‑761.

Cohabitation of Fibonacci and Galois Modes in One Linear Feedback Shift Register

Year 2021, Volume: 6 Issue: 2, 91 - 109, 31.08.2021
https://doi.org/10.30931/jetas.931101

Abstract

A linear feedback shift register (LFSR) is the basic element of the pseudo-random generators used to generate a sequence of pseudo-random values for a stream cipher. It consists of several cells; each cell is a flip-flop and a feedback function. The feedback function is a linear polynomial function; this function has a degree equal to the number of cells in the register. The basic elements of the register are connected to each other in two different ways, either in Fibonacci mode or in Galois mode.

In this work, we propose the realization of a specific register which is cohabitation of these two modes (Fibonacci and Galois) in the same register and for the same feedback function, and which will be controlled by a random function for the selection of mode, which will be based on the chaotic logistics map. This specific register gave better results compared to registers with separate modes.

References

  • [1] Schneier, B., “Applied cryptography-protocols, algorithms and source code in C”, John Wiley & Sounds, Inc, New York, Second Edition, (1996),.
  • [2] Menezes, A. J., Oorschot, P. C. V., Vanstone, S. A., “Handbook of applied cryptography” (1997) by CRC Press LLC.
  • [3] Gutub, A. A.-A., Al-Haidari, F., Al-Kahsah, K. M., Hamodi, J. “e-Text watermarking: utilizing “Kashida” extensions in Arabic language electronic writing”, J. Emerg. Technol. Web Intell. 2(1) (2010) : 48‑55.
  • [4] Gutub, A., Al-Qurashi, A., “Secure shares generation via m-blocks partitioning for counting-based secret sharing”, J. Eng. Res. 8(3) (2020) : 91‑117.
  • [5] George, M., Alfke, P., “Linear feedback shift registers in virtex devices (application note)”, http://www.xilinx.com/bvdocs/appnotes/xapp210.pdf.
  • [6] Goresky, M., Klapper, A., “Fibonacci and galois representations of feedback withcarry shift registers”, IEEE Transactions on Information Theory, 48(11) (2002) : 2826-2836.
  • [7] Stackoverflow, “Galois vs Fibonacci LFSR, more computer-friendly but what else?”, [online], nov 2011.
  • [8] Lv, Y., Tong, X., “A novel method of chaotic image encryption based on LFSR”, in 2009 International Conference on Management and Service Science, Beijing, China, sept. (2009) : 1‑4. doi: 10.1109/ICMSS.2009.5302775.
  • [9] Ayoup, A. M., Hussein, A. H., Attia, M. A. A., “Efficient selective image encryption”, Multimed. Tools Appl. 75(24) (2016): 17171‑17186.
  • [10] Kareem Jumaa, N., “Digital Image Encryption using AES and Random Number Generator”, Iraqi J. Electr. Electron. Eng. 14(1) (2018) : 80‑89.
  • [11] Naim, M., Ali Pacha, A., Serief, C., “A novel satellite image encryption algorithm based on hyperchaotic systems and Josephus problem”, Adv. Space Res. 67(7) (2021) : 2077‑2103.
  • [12] Golomb, S. W., “Shift register sequences”, Aegean Park Press, Laguna Hills, CA, (1982).
  • [13] Nyathi, J., Delgado-Frias, J. G., Lowe, J., “A high-performance, hybrid wave-pipelined linear feedback shift register with skew tolerant clocks,” 46th IEEE Midwest Symposium on Circuits and Systems, Cairo, Egypt, In Press, Dec. (2003).
  • [14] Mirella, A. M., Stratulat, M., “Study of software implementation for linear feedback shift register based on 8th degree irreducible polynomials”, International Journal Of Computers 8 (2014) : 46-55.
  • [15] Devaney, R. L., “A first course in chaotic dynamical systems theory and experiment”, New York: Westview Press, 1992. Aug 09, 2021. [online]: http://search.ebscohost.com/ login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=421133.
  • [16] Gleick, J., “Chaos: Making a New Science”, Albin Michel edition, (1987).
  • [17] Al-Roithy, B. O., Gutub, A. A., “Trustworthy image security via involving binary and chaotic gravitational searching within PRNG selections”, Int. J. Comput. Sci. Netw. Secur. 20(12) (2020) : 167‑176.
  • [18] Al-Qurashi, A., Gutub, A., “Reliable secret key generation for counting-based secret sharing”, J. Comput. Sci. Comput. Math. 8(4) (2018) 87‑101.
  • [19] Knuth, D.E., “The art of computer programming”, Addison-Wesley, Reading, MA, third edition, (1998).
  • [20] Berbain, C., “Analysis and design of stream algorithm Analysis and design of stream algorithm - in French language”, PhD thesis, University Paris 7. Diderot, supported on 10.2007, (2007).
  • [21] Gutub, A., Al-Shaarani, F., “Efficient implementation of multi-image secret hiding based on LSB and DWT steganography comparisons”, Arab. J. Sci. Eng. 45(4) (2020) : 2631‑2644.
  • [22] AlKhodaidi, T., Gutub, A., “Refining image steganography distribution for higher security multimedia counting-based secret-sharing”, Multimed. Tools Appl. 80(1) (2021) : 1143‑1173.
  • [23] Chen, G., Mao, Y., Chui, C. K., “A symmetric image encryption scheme based on 3D chaotic cat maps”, Chaos Solitons Fractals 21(3) (2004) : 749‑761.
There are 23 citations in total.

Details

Primary Language English
Subjects Mathematical Sciences, Engineering
Journal Section Research Article
Authors

Abderrahmene Hadj Brahım 0000-0003-2561-0481

Hana Ali Pacha 0000-0002-7247-5967

Naima Hadj Said 0000-0003-2561-0481

Adda Ali-pacha 0000-0003-1828-9562

Publication Date August 31, 2021
Published in Issue Year 2021 Volume: 6 Issue: 2

Cite

APA Hadj Brahım, A., Ali Pacha, H., Hadj Said, N., Ali-pacha, A. (2021). Cohabitation of Fibonacci and Galois Modes in One Linear Feedback Shift Register. Journal of Engineering Technology and Applied Sciences, 6(2), 91-109. https://doi.org/10.30931/jetas.931101
AMA Hadj Brahım A, Ali Pacha H, Hadj Said N, Ali-pacha A. Cohabitation of Fibonacci and Galois Modes in One Linear Feedback Shift Register. JETAS. August 2021;6(2):91-109. doi:10.30931/jetas.931101
Chicago Hadj Brahım, Abderrahmene, Hana Ali Pacha, Naima Hadj Said, and Adda Ali-pacha. “Cohabitation of Fibonacci and Galois Modes in One Linear Feedback Shift Register”. Journal of Engineering Technology and Applied Sciences 6, no. 2 (August 2021): 91-109. https://doi.org/10.30931/jetas.931101.
EndNote Hadj Brahım A, Ali Pacha H, Hadj Said N, Ali-pacha A (August 1, 2021) Cohabitation of Fibonacci and Galois Modes in One Linear Feedback Shift Register. Journal of Engineering Technology and Applied Sciences 6 2 91–109.
IEEE A. Hadj Brahım, H. Ali Pacha, N. Hadj Said, and A. Ali-pacha, “Cohabitation of Fibonacci and Galois Modes in One Linear Feedback Shift Register”, JETAS, vol. 6, no. 2, pp. 91–109, 2021, doi: 10.30931/jetas.931101.
ISNAD Hadj Brahım, Abderrahmene et al. “Cohabitation of Fibonacci and Galois Modes in One Linear Feedback Shift Register”. Journal of Engineering Technology and Applied Sciences 6/2 (August 2021), 91-109. https://doi.org/10.30931/jetas.931101.
JAMA Hadj Brahım A, Ali Pacha H, Hadj Said N, Ali-pacha A. Cohabitation of Fibonacci and Galois Modes in One Linear Feedback Shift Register. JETAS. 2021;6:91–109.
MLA Hadj Brahım, Abderrahmene et al. “Cohabitation of Fibonacci and Galois Modes in One Linear Feedback Shift Register”. Journal of Engineering Technology and Applied Sciences, vol. 6, no. 2, 2021, pp. 91-109, doi:10.30931/jetas.931101.
Vancouver Hadj Brahım A, Ali Pacha H, Hadj Said N, Ali-pacha A. Cohabitation of Fibonacci and Galois Modes in One Linear Feedback Shift Register. JETAS. 2021;6(2):91-109.