Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines


We present a realization of an LFSM that utilizes an LFSR. This is based on a well-known fact from linear algebra. This structure is used to show that a previous attempt at using a CA in place of an LFSR in constructing a stream cipher did not necessarily increase its security. We also give a general method for checking whether or not a nonlinear filter… (More)
DOI: 10.1007/978-3-540-25937-4_13


1 Figure or Table