Method of linear transformation (variants)

Information

  • Patent Grant
  • 10601582
  • Patent Number
    10,601,582
  • Date Filed
    Tuesday, July 26, 2016
    8 years ago
  • Date Issued
    Tuesday, March 24, 2020
    4 years ago
  • Inventors
    • Borisenko; Nikolay Pavlovich
    • Urivskiy; Alexey Viktorovich
  • Original Assignees
  • Examiners
    • Pyzocha; Michael
    • Tafaghodi; Zoha Piyadehghibi
    Agents
    • Faegre Drinker Biddle & Reath LLP
Abstract
The invention relates to the field of computer engineering and cryptography and, in particular, to methods for implementing linear transformations that operate with a specified speed and require minimum amount of memory, for further usage in devices for cryptographic protection of data. The technical result enables the selection of interrelated parameters (performance and required amount of memory) for a particular computing system when implementing a high-dimensional linear transformation. The use of the present method allows for a reduction of the amount of consumed memory at a given word size of processors employed. To this end, based on a specified linear transformation, a modified linear shift register of Galois-type or Fibonacci-type is generated according to the rules provided in the disclosed method, and the usage thereof enables to obtain the indicated technical result.
Description
CROSS REFERENCE TO RELATED APPLICATIONS

This application is a U.S. National Stage Application of International Patent Application No. PCT/RU2016/050024, filed Jul. 26, 2016, which claims priority to Russian Patent Application No. 2015131963, filed Jul. 31, 2015, each of which is expressly incorporated by reference herein in its entirety.


FIELD OF THE INVENTION

The invention relates to the field of computer engineering and cryptography and, in particular, to the use of shift registers for implementing high-dimensional linear transformations to be used subsequently in devices for cryptographic protection of data.


DESCRIPTION OF THE RELATED ART

A variety of methods for performing linear transformations are used for cryptographic protection of data.


A conventional method that improves both software and hardware implementation of a fixed linear transformation of the AES cipher is based on, the use of a specific form of a linear transformation matrix. The known method relates to cryptography and can be also used for software or hardware implementations in information security systems [1].


Other methods of linear transformations are also known in the art [2-4].


However, the known methods suffer from disadvantages in that they can not be used for performing arbitrary linear transformations, including high-dimensional ones, and that they inefficiently use resources in some computing platforms.


The use of linear feedback shift registers (LFSR) shows potential for implementing linear transformations [5]. Such registers, carried out by software or hardware and capable of operating in both the forward and reverse directions, can be implemented in a variety of computing platforms (FIGS. 1 to 4).


A great number of scientific works were published, which proposed implementation of linear transformations based on various LFSRs, including LFSRs of the Galois and Fibonacci type.


But such linear transformations are typically low-dimensional. When building a diffusion layer of a cryptographic transformation, e.g. a block cipher or a hash function, they do not allow to process the entire block of high dimension and require an additional linear transformation to enhance the security level, for example, in the AES standard this is the ShiftRows ( ) function, in the block cipher LED—the ShiftCells ( ) function, in the hash function of GOST R 34.11-2012—the byte permutation function. Generally, the use of low-dimensional linear transformations is compensated for by increasing the number of cryptographic transformation rounds to achieve higher strength, which leads to lower performance.


The method according to [2] that allows to efficiently implement a LFSR is the most relevant, in the technical sense, to the present invention, said method performing a linear operation and being applicable for linear transformation. The method is based on using separable tables and provided for implementing LFSRs only in a binary field.


This method is regarded as the closest prior art.


Another known method according to [3] allows to implement a high dimensional LFSR and requires little memory, but is slow, while the method according to [4] is fast, but requires too much memory.


The disadvantage of the closest prior art and the known techniques listed above is the impossibility to select parameters of a computing system for efficient use of its resources, and this fact does not allow to reduce the number of required operating cycles to be used in a processor system to compute the transformation result.


SUMMARY OF THE INVENTION

The technical result refers to enabling to select inter-related parameters (performance and required amount of memory) for a particular computing system when implementing a high-dimensional linear transformation.


To this end, a method is provided that enables to perform a linear transformation of an original message using a Galois-type LFSR (FIGS. 1, 2) or a Fibonacci-type LFSR (FIGS. 3, 4).


Furthermore, knowing a processor word size and an amount of memory allocated for performing the method, it can be determined in advance how many LFSR cycles are required to compute the linear transformation of the original message.


An embodiment of the method involves generating a Galois-type LFSR and a linear transformation of a message S represented in a binary form, the method comprising:

    • setting a word size W of a processor of a computing system equal to an integer power of 2;
    • setting an available amount of memory of the computing system of M bits;
    • setting a size s of the message S, where s is multiple of W;
    • setting a value n of a number of bits of a linear feedback shift register (LFSR) according to a Galois configuration (FIGS. 1, 2), so that






n
=

W

2
N








    •  is met,

    • where N∈0, 1, 2, . . . ,

    • generating the LFSR according to the Galois configuration with the following parameters:

    • an internal primitive polynomial











f


(
x
)


=


x
n






i
=
0


n
-
1









a
i



x
i





,






a
i



GF


(
2
)









    • an external polynomial











h


(
y
)


=


y
m






i
=
0


m
-
1









h
i



y
i





,






where





m

=

s
n








    •  is a number of stages in the LFSR, while hi∈GF(2n)

    • an initial state of stages of the LFSR, qi, forms a data vector

      X=(qm−1,qm−2, . . . ,q2,q1,q0),

    • where qi ∈GF(2n), 0≤i≤m−1

    • an output state of the stages of the LFSR, q′i, for one operating cycle forms a vector

      Y=(q′m−1,q′m−2, . . . ,q′2,q′1,q′0), while
      • q′i∈GF(2n), 0≤i≤m−1,

    • where q′i=hi·qm−1⊕qi−1, for 1≤i≤m−1,
      • q′0=h0·qm−1

    • defining all divisors of the number m as values p0, p1, . . . , pd, where p0<p1< . . . pd;

    • selecting a maximum possible divisor p from










p


M
sn


;






    • modifying the LFSR by performing the following actions:
      • computing R matrices Hr, where r=(R−1), . . . , 0, with a size of n×k rows, each having a length of n×k bits, by performing the following actions:
        • computing k=p,
        • computing










R
=

m
k


,










        • where R is a number of matrices H;

        • computing j=m−k;

        • computing t=0;

        • (A1) if j≤m−1 is not met,

        • then going to step A3;

        • computing l=0,

        • (A2) if l<n is not met,

        • then computing j=j+1,
          • t=t+1,

        • going to step A1;

        • setting an initial state of the LFSR














X
=

(


q

m
-
1


,





,

q
1

,

q
0


)


,






q
i

=

{





0
,

0

i


j
-

1





or





j

+
1


i


m
-
1









2
l

,

i
=
j

,




,

0

i


m
-
1


,






where






q
i




GF


(

2
n

)



,













        • computing, after k operating cycles for each initial state, a new state of the LFSR

          Y=(q′m−1, . . . ,q′1,q′0),



      • where q′i∈GF(2n), 0≤i≤m−1,
        • computing t-th values for all matrices Hi, i=r−1 . . . 0 by concatenating k values of stages q′

          Hr,i=q′kr+k−1∥ . . . ∥q′kr,
        • while 0≤rδR−1
        • computing l=l+1,
        • going to step A2;



    • (A3) recording, into stages of the modified LFSR, blocks s of the original message S, where an initial state of the stages of the modified LFSR, qi, forms a vector

      X′=(QR−1, . . . ,Q1,Q0),

    • where Qr is contents of stages qkr+k−1∥ . . . ∥ qkr, while 0≤r≤R−1

    • performing R operating cycles of the modified LFSR by performing, at each cycle, the following actions:
      • computing an output state of the stages of the modified LFSR Q′i for one cycle, thereby forming a vector

        Y′=(Q′R−1, . . . ,Q′1,Q′0),
      • each value Q′i of said vector being computed according to the formula

        Q′i=f(Hi)⊕Qi−1
      • for each i=R−1, . . . , 1,
      • while Q′0=f(H0),
      • where











f


(

H
r

)


=





W
-
1



j
=
0





z


R
-
1

,
j


·

H

r
,
j





,








      • where zR−1,j is a value of j-th bit of a vector QR−1,

      • while r=R−, . . . , 1, 0,
        • j=0, 1, . . . , W−1,
        • zR−1,j∈GF(2);



    • obtaining, after the R operating cycles of the LFSR, a linear transformation of blocks s of the message S;

    • reading out, from the stages of the modified LFSR, blocks of a linearly transformed message S;

    • combining the blocks and obtaining the linearly transformed message S.





According to another embodiment, the method involves generating a Fibonacci-type LFSR and a linear transformation of a message S represented in a binary form, the method comprising:

    • setting a word size W of a processor of the computing system equal to an integer power of 2;
    • setting an available amount of memory of the computing system of M bits;
    • setting a size s of the message S, where s is multiple of W;
    • setting a value n of a number of bits of a linear feedback shift register (LFSR) according to a Fibonacci configuration (FIGS. 3, 4) so that






n
=

W

2
N








    •  is met,





where N∈0, 1, 2, . . . ,

    • generating the LFSR according to the Fibonacci configuration with the following parameters:


an internal primitive polynomial








f


(
x
)


=


x
n






i
=
0


n
-
1









a
i



x
i





,






a
i



GF


(
2
)







an external polynomial








h


(
y
)


=


y
m






i
=
0


m
-
1









h
i



y
i





,






where





m

=

s
n







is a number of stages in the LFSR,

    • while hi∈GF(2n)
    • an initial state of the stages of the LFSR, qi, forms a vector

      X=(qm−1,qm−2, . . . ,q2,q1,q0),
    • while qi∈GF(2n), 0≤i≤m−1


an output state of the stages of the LFSR, q′i, for one operating cycle, forms a vector

Y=(q′m−1,q′m−2, . . . ,q′2,q′1,q′0),

    • while q′i∈GF(2n), 0≤i≤m−1,
    • where q′i=qi+1,
      • for each i=0, . . . , m−2







q

m
-
1



=





m
-
1



i
=
0





h
i

·

q
i









    • defining all divisors of the number m as values p0, p1, . . . , pd, where p0<p1< . . . pd;

    • selecting a maximum possible divisor p from










p


M
sn


;






    • modifying the LFSR by performing the following actions:
      • computing R matrices Hr, where r=(R−1), . . . , 0, with a size of n×k rows, each having a length of n×k bits, by performing the following steps:
      • computing k=p,
      • computing










R
=

m
k


,








      • where R is a number of matrices Hr;

      • computing r=0;

      • (A5) if r<R is not met, then going to step A7;

      • computing j=0,

      • (A6) if j<k is not met, then computing r=r+1, going to step A5;

      • computing l=0,

      • if l<n is not met, then computing

      • j−j+1,

      • going to step A6;

      • setting an initial state of the LFSR















X
=

(


q

m
-
1


,

q

m
-
2


,





,

q
1

,

q
0


)


,












q
i

=

{





2
l

,





i
=

rk
+
j


,





















,

0

i


m
-
1


,






0
,



otherwise



















where












q
i



GF


(

2


)



;
















      • computing, after k operating cycles for each initial state, a new state of the LFSR

        Y=(q′m−1,q′m−2, . . . ,q′1,q′0),



    • where q′i∈GF(2n), 0≤i≤m−1;
      • computing a (jk+l)-th value for a matrix Hr by concatenating k values of stages q′m−1, q′m−2, . . . , q′m−k
        Hr,t=q′kr+k−1∥ . . . ∥q′kr,
      • where 0≤r≤R−1;
      • computing l=l+1,
      • going to step A6;

    • (A7) recording, into stages of the modified LFSR, blocks s of the original message S, where an initial state of the stages of the modified LFSR, qi, forms a vector

      X′=(QR−1, . . . ,Q1,Q0),

    • where Qr=qkr+k−1∥ . . . ∥qkr,
      • while 0≤r≤R−1;

    • performing R operating cycles of the modified LFSR by performing, at each cycle, the following actions:
      • computing an output state of the stages of the modified LFSR Q′i for one cycle, thereby forming a vector

        Y′=(Q′R−1, . . . ,Q′1,Q′0),

    • each value Q′i of said vector being computed by the formula

      Q′i=Qi+1

    • for each i=0, . . . , R−2,

    • and Q′R−1=Q′m−1,

    • and a value Q′m−1 computed from














Q

m
-
1



=





r
=
0



R
-
1




f


(

H
r

)




,










where












f


(

H
r

)


=





j
=
0



W
-
1





z

r
,
j


·

H

r
,
j





,














    • where zr,j is a value of a j-th bit of a vector Qr,

    • while r=R−1, . . . , 1, 0,
      • j=0, 1, . . . , W−1,
      • zr,j∈GF(2);

    • obtaining, after the R operating cycles of the LFSR, a linear transformation of the blocks s of the message S;

    • reading out, from the stages of the modified LFSR, blocks s of a linearly transformed message S;

    • combining the blocks and obtaining the linearly transformed message S.





To implement the present method using a Galois-type LFSR, the LFSR is modified.


The principal distinction of the modified Galois LFSR is in the way of computing a feedback function value. In the modified Galois LFSR, feedback function values of the register are computed from tables, depending on values of bits of the high stage of the register.


An initial linear transformation is L:Vscustom characterVs. The transformation L is set based on the Galois LFSR over a composite field GF((2n)m), where s=m×n, using the internal primitive polynomial

f(x)=xn⊕Σi=0n−1aixi,


where ai∈GF(2),


and the external irreducible polynomial

h(y)=ym⊕Σi=0m−1hiyi,


where hi∈GF(2n) and h0=1.


The initial state of the stages of the Galois LFSR, qi, forms a data vector

X=(qm−1,qm−2, . . . ,q2,q1,q0),

    • where qi∈GF(2n), 0≤i≤m−1.


Elements of the composite field GF((2n)m) are also computed using the following linear feedback shift register (hereinafter LFSR) of the Galois configuration based on the polynomials f(x) and h(y) [4].


The linear transformation L of the original data vector X=(qm−1, qm−2, . . . , q2, q1, q0) refers herein to the result of m in cycles of the LFSR.


The output state of the stages of the Galois LFSR, q′i, for one operating cycle, forms the vector

Y=(q′m−1,q′m−2, . . . ,q′2,q′1,q′0),


where q′i∈GF(2n), 0≤i≤m−1,


and each value q′i is computed by the formula

q′i=hi·qm−1⊕qi−1


for each i=m−1, . . . , 1 and q′0=h0·qm−1.


The operations of adding and multiplying two n-bit numbers in the Galois LFSR are performed in the field GF(2n). The linear transformation of the original data vector is performed in m cycles of the Galois-type LFSR.


The transformation results in a new state of the register at the m-th cycle. A reverse linear transformation L−1 is performed in m cycles of the LFSR in the reverse direction.


Let p0, p1, . . . , pd are all divisors of the number m, while p0<p1< . . . pd. Let us denote values







k
=

p
i


,

R
=



m
k






and





W

=
nk


,





where W is the word size of the processor which performs the initial linear transformation, pi is selected based on the amount of available memory M. FIG. 5 shows a general configuration of the modified Galois LFSR.


Let the initial state of the stages of the modified Galois LFSR form the vector

X′=(QR−1, . . . ,Q1,Q0),


where Qr is equal to the content of stages qkr+k−1∥ . . . ∥qkr,

    • while 0≤r≤R−1.


The output state of the stages of the modified Galois LFSR Q′i, for one operating cycle, forms the vector Y′=(Q′R−1, . . . , Q′1, Q′0), and each value Q′i for each r=R−1, . . . , 1 is computed by the formula

Q′r=f(Hr)⊕Qr−1


while Q′0=f(H0),


and the function is defined as:











f


(

H
r

)


=





j
=
0



W
-
1





z


R
-
1

,
j


·

H

r
,
j





,










where











r
=

R
-
1


,





,
1
,
0
,













z


R
-
1

,
j




GF


(
2
)



,












j=0, 1, . . . , W−1 are bits of stage QR−1 of the modified Galois LFSR.


If the state at the m-th cycle is the result of the linear transformation L according to the Galois LFSR configuration (FIG. 1), then the same state will be obtained at the R-th cycle of the modified Galois LFSR (FIG. 5). Moreover, R cycles of the modified LFSR require







R




·
W

=



m
k

·
n
·
k

=

m
·
n







“true-false” check operations for all bits of the stage QR−1. The number of modulo-2 additions of W-bit numbers for each computation of the value f(Hr) from each table is equal to W−1. Therefore, each operating cycle of the modified Galois LFSR requires the following number of additions:








R


(

W
-
1

)


+
R
-
1

=


RW
-
1

=




m
k


nk

-
1

=

mn
-
1







As a result, the required number of modulo-2 additions of W-bit numbers for R cycles of the modified Galois LFSR is equal to







R


(

mn
-
1

)


=


m


(

mn
-
1

)


k





The required memory amount is


















M
=






R
·
W
·
W


=



m
k

·


(

n
·
k

)

2


=


m
·

n
2

·
k













(
bits
)










to store R tables Hr=15, . . . , 0.


For proper functioning of the configuration of FIG. 5 according to the rule of the configuration of FIG. 1 (obtaining the same output for the same input data), it is necessary to determine R tables Hr, r=(R−1), . . . , 0. FIG. 6 shows the flowchart for calculating them.


The sequence of calculation of R tables Hr, r=(R−1), . . . , 0 is based on the principle of superposition of linear transformations. Input data of the algorithm is a linear transformation over the specified composite field GF((2n)m), and p is any one of divisors of the number m. Output data is R required tables Hr, r=(R−1), . . . , 0.


Every step of the algorithm (FIG. 6) will be considered hereinbelow.


Step 1 [Block 2]: Assigning values







k
=
p

,

R
=

m
k


,

j
=

m
-
k


,





and t=0;


Step 2 [Item A—Block 3]: Checking the condition j≤m−1

    • if the condition is met, assigning l=0 (Block 4) and going to Step 3 [Item B];
    • if the condition is not met, completing the process;


Step 3 [Item B—Block 5] Checking the condition l<n

    • if the condition is met,
    • determining the initial state of the Galois LFSR (Block 6):







q
i

=

{




0
,




0

i


j
-

1





or





j

+
1


i


m
-
1






















,

0

i


m
-
1


,







2
l

,










i
=
j

,

















    • computing the new state Y=(q′m−1, . . . , q′1, q′0) of the Galois LFSR after k operating cycles for each initial state X=(qm−1, . . . , q1, q0), where qi, q′i∈GF(2n), 0≤i≤m−1 (Block 7),

    • computing t-th values for all tables H by concatenating k values of the stages q′ (Block 8);

      Hr,t=q′kr+k−1∥ . . . ∥q′kr, 0≤r≤R−1,
      • incrementing the value l=l+1 (Block 9), and going to Step 3 [Item B];

    • if the condition is not met, incrementing the values j=j+1, t=t+1 (Block 10), and going to Step 2 [Item A].





The order of computing the required tables for the reverse linear transformation L−1 is the same. But in this case the resulting modified Galois-type LFSR will operate in the reverse direction with the “true-false” check for all bits of the stage Q0 instead of QR−1.


If the linear transformation L:Vscustom characterVs is set based on the Fibonacci LFSR over the composite field GF((2n)m), where s=m×n, using the internal primitive polynomial

f(x)=xn⊕Σi=0n−1aixi,


where ai∈GF(2),


and the external irreducible polynomial

h(y)=ym⊕Σi=0m−1hiyi,


where hi∈GF(2n) and h0=1,


then it can be implemented according to the modified Fibonacci LFSR configuration.


The initial state of the stages of the Fibonacci LFSR, qi, forms the data vector

X=(qm−1,qm−2, . . . ,q2,q1,q0),


where qi∈GF(2n), 0≤i≤m−1


The output state of the stages of the Fibonacci LFSR, q′i, for one operating cycle, forms the vector

Y=(q′m−1,q′m−2, . . . ,q′2,q′1,q′0),


where q′i∈GF(2n), 0≤i≤m−1


and each value q′i is computed by the formula

q′i=qi+1


for each i=0, . . . , m−2 and







q

m
-
1



=





i
=
0



m
-
1





h
i

·


q
i

.







The operations of adding and multiplying two n-bit numbers in the Fibonacci LFSR are performed in the field GF(2n). The linear transformation of the original data vector takes in cycles of the Fibonacci LFSR (FIG. 3). The transformation results in a new state of the register at the m-th cycle. A reverse linear transformation L−1 is attained after m cycles of the Fibonacci LFSR in the reverse direction (FIG. 4).


In this case, the modified Fibonacci LFSR has a general configuration shown in FIG. 7.


Let the initial state of the stages of the modified Fibonacci LFSR form the vector

X′=(QR−1, . . . ,Q1,Q0),


where Qr=qkr+k−1∥ . . . ∥qkr, 0≤r≤R−1


The output state of the stages Q′i for one operating cycle forms the vector

Y′=(Q′R−1, . . . ,Q′1,Q′0),


and each value Q′i is computed by the formula Q′r=Qr+1 for each r=0, . . . , R=2 and








Q

R
-
1



=





r
=
0



R
-
1




f


(

H
r

)




,










f


(

H
r

)


=





j
=
0



W
-
1





z

r
,
j


·

H

r
,
j





,










where











r
=

R
-
1


,





,
1
,
0
,













z

r
,
j




GF


(
2
)



,













j=0, 1, . . . , W−1-bits of stage Qr of the modified Fibonacci LFSR.


If the state at the m-th cycle is the result of the linear mapping L according to the Fibonacci LFSR configuration in FIG. 3, then the state at the R-th cycle corresponds to its result according to the modified Fibonacci LFSR configuration in FIG. 7. Moreover, R cycles of its operation require







R
·
R
·
W

=




(

m
k

)

2

·
n
·
k

=



m
2

·
n

k







“true-false” check operations. The number of modulo-2 additions of W-bit numbers for computing each value f(Hr) from each table is equal to W−1. Therefore, each cycle of the modified Fibonacci LFSR requires








R


(

W
-
1

)


+
R
-
1

=


RW
-
1

=



m
k


nk

=

1
=

mn
-
1









operations of modulo-2 addition of W-bit numbers. As a result, the number of modulo-2 additions of W-bit numbers for R cycles of the register is







R


(

mn
-
1

)


=


m


(

mn
-
1

)


k





The required memory amount is







R
·
W
·
W

=



m
k

·


(

n
·
k

)

2


=


m
·

n
2

·
k













(
bits
)











for storing R tables Hr, r=15, . . . , 0.


For correct operation of the modified configuration it is, necessary to determine R tables Hr, r=(R−1), . . . , 0. FIG. 8 shows the flowchart for computing them.


The algorithm for computing R tables Hr, r=(R−1), . . . , 0 is also based on the principle of superposition of linear transformations. Input data of the algorithm is a linear transformation over the specified composite field GF((2n)m) that is provided according to the Fibonacci LFSR, and p is any one of divisors of the number m. Output data is R required tables Hr, r=(R−1), . . . , 0.


Every step of the algorithm is considered hereinbelow.


Step 1 [Block 2]; Assigning values







k
=
p

,

R
=

m
k


,



and





r

=
0

;





Step 2 [Item A—Block 3]: Checking the condition r<R

    • if the condition is met, assigning j=0 (Block 4) and going to Step 3 [Item B],
    • if the condition is not met, completing the process;


Step 3 [Item B—Block 5] Check condition j<k

    • if the condition is met, assigning l=0 (Block 6) and going to Step 4 [Item B];
    • if the condition is not met, incrementing the value r=r+1 (Block 12), and going to Step 2 [Item A];


Step 4 [Item B—Block 7] Checking the condition l<n

    • if the condition is met,
    • determining the initial state of the Fibonacci LFSR (Block 8):







q
i

=

{





2
l

,





1
=

rk
+
j


,





















,

0

i


m
-
1


,






0
,



otherwise















    • computing the new state Y=(q′m−1, . . . , q′1, q′0) of the Fibonacci LFSR after k operating cycles for each initial state X=(qm−1, . . . , q1, q0), where qi, q′i∈GF(2n), 0≤i≤m−1 (Block 9)

    • computing the (jk+l)-th value for table Hr by concatenating k values of the stages q′m−1, q′m−2, . . . , q′m−k (Block 10)

      Hr,jk+l=q′m−1∥ . . . ∥q′m−k

    • incrementing the value l=l+1 (Block 10), and going to Step 4 [Item B];

    • if the condition is not met, incrementing the value j=j+1 (Block 11), and going Step 3 [Item B].





The order of computing the required tables for the inverse linear mapping L−1 is the same. But in such a case it would be necessary to use the Fibonacci LFSR configuration (FIG. 4) to compute its state (lock 9, FIG. 8). The resulting modified LFSR is shifted in the opposite direction.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 shows a workflow of a Galois-type linear feedback shift register in the forward direction.



FIG. 2 shows a workflow of the Galois-type linear feedback shift register in the reverse direction.



FIG. 3 shows a workflow of a Fibonacci-type linear feedback shift register in the forward direction.



FIG. 4 shows a workflow of the Fibonacci linear feedback shift register in the reverse direction.



FIG. 5 shows a workflow of a modified Galois-type linear feedback shift register.



FIG. 6 shows a flow chart of an algorithm for computing feedback function tables of the modified Galois-type linear feedback shift register.



FIG. 7 shows a workflow of a modified Fibonacci-type linear feedback shift register.



FIG. 8 shows a flow chart of an algorithm for computing feedback function tables of the Fibonacci-type modified linear feedback shift register.



FIG. 9 shows a schematic diagram of a Galois-type linear feedback shift register for a forward linear transformation, illustrating an embodiment of the method.



FIG. 10 shows a schematic diagram of a Galois-type linear feedback shift register for a reverse linear transformation, illustrating an embodiment of the method.



FIG. 11 shows a workflow of a modified Galois-type linear feedback shift register for a forward linear transformation, illustrating an embodiment of the method.



FIG. 12 shows a workflow of a modified 16-bit Galois-type linear feedback shift register for a forward linear transformation, illustrating an embodiment of the method.



FIG. 13 shows a workflow of a modified 32-bit Galois-type linear feedback shift register for a forward linear transformation, illustrating an embodiment of the method.



FIG. 14 shows a workflow of a modified 64-bit Galois-type linear feedback shift register for a forward linear transformation, illustrating an embodiment of a method.





DESCRIPTION OF EMBODIMENTS OF THE INVENTION

An exemplary implementation of the present method using a modified Galois-type LFSR will be described hereinbelow.


The present method can be implemented in an application for a computing system, and a computer with one processor that has the word size of 8-bit and higher and operates under control of an operating system (for example, Microsoft Windows 7) can serve as such a computing system.


The application for implementing operation of a Galois (or Fibonacci)-type LFSR can be developed by an artisan skilled in the field of programming based on the knowledge of conventional principles and structures of a LFSR of an appropriate type and the steps of the method provided hereby.


For the sake of convenience in analysis and synthesis, the description of the invention considers a linear transformation L with specific parameters typical to a large class of cryptographic algorithms:

    • an initial linear transformation L:V128custom characterV128;
    • a composite field GF((28)16) (m=16, n=8);
    • an internal primitive polynomial

      f(x)=x8⊕x7⊕x6⊕x⊕1
    • for generating the field GF(28);
    • an external irreducible polynomial h(y) for generating the composite field GF((28)16)

      h(j)=y16+148y15+32y14+133y13+16y12+194y11+192y10+y9++251y8+y7+192y6+194y5+16y4+133y3+32y2+148y+1,


where


(h15, h14, . . . , h0)=(148, 32, 133, 16, 194, 192, 1, 251, 1, 192, 194, 16, 133, 32, 148, 1) hiεGF(28)



FIG. 9 and FIG. 10 show a LFSR configuration for the forward transformation L and a LFSR configuration for a reverse transformation L−1, respectively.


A useful property for a linear transformation has been recently discovered in cryptography: if any sequence of symbols is recorded into stages of a LFSR and the register is “shifted” left 16 times, then check code symbols with the maximum distance will remain in the register (MDS-code): C(32, 16, 17) [6]. The minimum distance between any code words of this code is 17. If such a code is taken as a linear transformation of a block cipher, then it will have the maximum dispersion property (d=17).


The operating sequence for one cycle of the LFSR is the following:

    • an initial state—a vector X=(q15, q14, . . . , q2, q1, q0), where qi∈GF(28), 0≤i≤15. The vector X has 16 coordinates disposed from left to right in 16 stages of the LFSR, starting from the coordinate with the index i=15;
    • in operation of a Galois LFSR only the value q15 in the highest stage is involved in obtaining the feedback function value;
    • an output state—a vector Y=(q′15, q′14, . . . , q′2, q′1, q′0), where q′i∈GF(28), 0≤i≤15. Vales q′i for each i=15, . . . , 1 are computed as

      q′i=hi·q15⊕qi−1,


while q0=h0·q15


The linear transformation L of the original data vector

X=(q15,q14, . . . ,q2,q1,q0)

will refer herein to 16 operating cycles of the LFSR.


The transformation results in a new state of the register at the m-th cycle, which can be written down as

Y=(q′15,q′14, . . . ,q′2,q′1,q′0),


where q′i∈GF(28), 0≤i≤15 are values of stages of the LFSR.


The reverse transformation L−1 takes 16 operating cycles of the LFSR in the reverse direction.


Let us denote some divisor of the number m=16 as k (the selection thereof is defined by the available processor word W and available amount of memory M).


The essence of the present way of implementing on an appropriate platform depends on the value k and is based on applying the superposition principle when considering the effect of each bit of the current state of the LFSR on the subsequent state, in accordance with the fact that for each k there is a way to implement the transformation L at an (nk)-bit processor.


The following cases will be discussed hereinbelow.


Computation case 1: k=1. This case considers the way of implementing the transformation L at 8-bit processors (n·k=8·1=8). For this case the following steps are performed:

    • computing a number r of required computable tables







H
j

,

j
=
15

,





,
0






r
=


m
k

=


16
1

=
16








    • computing 16 tables Hj, j=15, . . . , 0, each having nk=8·1=8 elements, where the elements are 8-bit numbers (elements of the field GF(28)), by performing the following steps:
      • computing a respective state of the LFSR (FIG. 1) after k=1 operating cycles for each initial state









X
=


(


q

m
-
1


,

q

m
-
2


,





,

q
2

,

q
1

,

q
0


)

=

(


q
15

,


0
,





,
0




15





times




)






for all q15=2l, l=0, . . . , 7, i.e. the effect of each bit of the number q15 on the state of the LFSR (FIG. 1) after k=1 operating cycles is considered; the result is nk=8 states;

    • forming an array A of nk=8 obtained states in such a way that its last row corresponds to the state at j=m−k=16−1=15 and l=0, and the penultimate road corresponds to the state at j=m−k=16−1=15 and l=1, and so on. As a result of doing so, the array A has nk=8 rows and m=16 columns. The first column of the array A corresponds to values of the stage q15, the second one—to q14, and so on (Table 1);
    • when k=1, the tables Hj, j=15, . . . , 0 are equal to each column of the array A in accordance with indices.









TABLE 1







Results of LFSR operation after one cycle








Initial states
States of LFSR























q15, . . . , q0
H15
H14
H13
H12
H11
H10
H9
H8
H7
H6
H5
H4
H3
H2
H1
H0





27, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
E5
6D
B2
D7
6E
AD
80
DE
80
AD
6E
D7
B2
6D
E5
80


26, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
93
D7
59
8A
37
B7
40
6F
40
B7
37
8A
59
D7
93
40


25, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
A8
8A
CD
45
FA
BA
20
D6
20
BA
FA
45
CD
8A
A8
20


24, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
54
45
87
C3
7D
5D
10
6B
10
5D
7D
C3
87
45
54
10


23, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
2A
C3
A2
80
DF
CF
08
D4
08
CF
DF
80
A2
C3
2A
08


22, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
15
80
51
40
8E
86
04
6A
04
86
8E
40
51
80
15
04


21, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
EB
40
C9
20
47
43
02
35
02
43
47
20
C9
40
EB
02


20, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
94
20
85
10
C2
C0
01
FB
01
C0
C2
10
85
20
94
01











    • generating an extended LFSR configuration (FIG. 5) which has r=16 stages, each having a value representing a 8-bit number;

    • denoting a state of the extended LFSR as (Q15, Q14, . . . , Q2, Q1, Q0), where Qi∈GF(28), i=15, 14, . . . , 0;

    • determining a value f(Hj) of the feedback function for each Hj by the formula














f


(

H
j

)


=





u
=
0


7



w

15
,
u







·

H

j
,
u



,











where











j
=
15

,





,
1
,
0
,












w

15
,
u




GF


(
2
)


















      • u=0, 1, . . . , 7-bits of the stage Q15 of the extended LFSR.







This means that if the u-th bit of the stage Q15 equals unity, then the respective row Hj,u participates in the process of deriving the feedback function value.

    • The forward linear transformation L comprises r=16 cycles of the extended LFSR;
    • The 16 cycles of the extended. LFSR require







r
·
n
·
k

=



m
k

·
n
·
k

=


m
·
n

=


16
·
8

=
128








“true-false” check operations for all bits of the stage Q15 and







r
·
r
·
n
·
k

=



m
k

·

m
k

·
n
·
k

=




m
2

·
n

k

=




16
2

·
8

1

=
2048








modulo-2 addition operations for two n×k-bit numbers and Ql and Hl,j, where l=0, 1, . . . , r−1 and j=0, 1, . . . , nk.


The required amount of memory is







r
·

(

n
·
k

)

·

(

n
·
k

)


=



m
k

·


(

n
·
k

)

2


=


m
·

n
2

·
k

=


16
·

8
2

·
1

=
1024








bits=128 bytes for storing 16 tables Hj, j=15, . . . , 0.


The order of implementing the reverse linear transformation L−1 at 8-bit processors is performed similarly, using the LFSR (FIG. 2) for computing 16 tables Hj, j=15, . . . , 0. Due to symmetry of the external irreducible polynomial h(y) for the discussed linear transformation, the same 16 tables Hj, j=15, . . . , 0 can be used both for the forward transformation and for the transformation reverse thereto.


Computation case 2: k=2. In this case a method of implementing the transformation L at 16-bit processors is considered. The method comprises the following steps:

    • Computing a number r of required computable tables Hj, j=7, . . . , 0






r
=


m
k

=


16
2

=
8








    • computing r=8 tables, Hj, j=7, . . . , 0, each having nk=8·2=16 elements, where the elements are 16-bit numbers, by performing the following steps:
      • computing a respective state of the LFSR (FIG. 1) after k=2 operating cycles for each initial state









X
=


(


q

m
-
1


,

q

m
-
2


,





,

q
2

,

q
1

,

q
0


)

=

(


q
15

,

q
14

,


0
,





,
0




14





times




)








    • for all

      qj=2l, j=14,15 custom characterl=0, . . . ,7,

    • beginning from the stage at the position j=m−5=16−2=14, i.e. the effect of each bit of the number q15∥q14 on the state of the LFSR is considered (FIG. 1) after k=2 cycles. nk=16 states are obtained as a result:
      • generating an array A of nk=16 obtained states such that its last row corresponds to the state at j=m−k=16−2=14 and l=0, and its penultimate row corresponds to the state at j=m−k=16−2=14 and l=1, and so on, and the first row of the array A corresponds to the state at j=m−1=16−1=15 and l=n−1=8−1=7. As a result of doing so, the array A has nk=16 rows and m=16 columns;
      • forming r=8 tables Hj, j=7, . . . 0, beginning from the value j=(r−1)=8−1=7, by concatenating k=2 values in adjacent columns of the array A, beginning from its first column, wherein the numbering in performed in such a way that, e.g. for the table H7, the value in the first row of the first column after the concatenation corresponds to H7,15, while the value in the last row of the same column corresponds to H7,0 (Table 2).












TABLE 2







States of LFSR after two operating cycles










Initial states
States of LFSR after concatenation of two adjacent stages
















No
q15, . . . , q0
H7
H6
H5
H4
H3
H2
H1
H0



















15
27, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
3222
2526
4266
3B76
4888
38FA
9F75
DFE5


14
26, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
1911
F313
2133
FC3B
2444
1C7D
AEDB
8E93


13
25, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
EDE9
98E8
F1F8
7EFC
1222
0EDF
578C
47A8


12
24, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
9795
4C74
997C
3F7E
0911
078E
CA46
C254


11
23, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
AAAB
263A
AD3E
FE3F
E5E9
E247
6523
612A


10
22, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
55B4
131D
B71F
7FFE
9395
71C2
D3F0
D115


9
21, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
CB5A
E8EF
BAEE
DE7F
A8AB
D961
8878
89EB


8
20, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
842D
7496
5D77
6FDE
54B4
8DD1
443C
A594


7
0, 27, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
E56D
B2D7
6EAD
80DE
80AD
6ED7
B26D
E580


6
0, 26, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
93D7
598A
37B7
406F
40B7
378A
59D7
9340


5
0, 25, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
A88A
CD45
FABA
20D6
20BA
FA45
CD8A
A820


4
0, 24, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
5445
87C3
7D5D
106B
105D
7DC3
8745
5410


3
0, 23, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
2AC3
A280
DFCF
08D4
08CF
DF80
A2C3
2A08


2
0, 22, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
1580
5140
8E86
046A
0486
8E40
5180
1504


1
0, 21, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
EB40
C920
4743
0235
0243
4720
C940
EB02


0
0, 20, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0
9420
8510
C2C0
01FB
01C0
C210
8520
9401











    • generating an extended configuration of the LFSR, where the extended LFSR has r=8 stages, each having a value representing a 16-bit number;

    • a state of the extended LFSR can be represented as

      (Q7,Q6, . . . ,Q2,Q1,Q0)

    • determining a value f(Hj) of the feedback function for each Hj by the formula














f


(

H
j

)


=





u
=
0


15



w

7
,
u







·

H

j
,
u



,











where











j
=
7

,





,
1
,
0
,












w

7
,
u




GF


(
2
)


















      • u=0, 1, . . . , 15-bits of the stage Q7 of the extended LFSR.







This means that, if the ii-th bit of the stage Q15 equals unity, then the respective row Hj,u participates in the process of deriving the feedback function value.


The forward linear transformation L comprises r=8 operating cycles of the extended LFSR, where the 8 operating cycles of the extended LFSR require







r
·
n
·
k

=



m
k

·
n
·
k

=


m
·
n

=


16
·
8

=
128








“true-false” check operations


and







r
·
r
·
n
·
k

=



m
k

·

m
k

·
n
·
k

=




m
2

·
n

k

=




16
2

·
8

2

=
1024








modulo-2 addition operations of two 16-bit numbers.


The required amount of memory is







r
·

(

n
·
k

)

·

(

n
·
k

)


=



m
k

·


(

n
·
k

)

2


=


m
·

n
2

·
k

=


16
·

8
2

·
2

=
2048








bits=256 bytes for storing 8 tables Hj, j=7, . . . , 0.



FIG. 12 shows the obtained resulting configuration.


The order of implementing the reverse linear transformation L−1 at 16-bit processors is performed similarly with the use of the LFSR (FIG. 2) to form 8 tables Hj, j=7, . . . , 0. Due to symmetry of the external irreducible polynomial h(y) for the discussed linear transformation, the same 8 tables Hj, j=7, . . . , 0 can be used to implement both the forward transformation and the transformation reverse thereto.


Similarly, at k=4 and k=8, the forward linear transformation L and the one reverse thereto can be implemented at 32 and 64-bit processors (FIGS. 13 and 14, respectively).


Table 3 shows the results of calculations of numerical values typical to preforming the present method using the Galois-type LFSR.









TABLE 3







Results of calculations of numerical values typical to


preforming the present method using the Galois LFSR











Word size
Number of
Amount of
Number of
Required


of the
required
required
modulo-2
number of


processor
“true/false”
memory,
additions of two
processor


used
checks
bytes
memory stages
cycles














8
128
128
2048
16


16
128
256
1024
8


32
128
512
512
4


64
128
1024
256
2









Comparative analysis of values presented in Table 3 shows that the present method makes it possible to select inter-related parameters of the computing system.


For example, if a 8-bit processor is available, then implementation of the specified linear transformation will require the minimum memory amount of 128 bytes and 16 shift operations for sixteen bytes.


If a more powerful 64-bit processor is available, then implementation of the specified linear transformation will require 1024 bytes of memory and only 2 shift operations for two 64-bit words.


As a result, the use of the present method also offers additional opportunities to developers in designing an application program or a hardware unit of a computing system that implements the linear transformation, and taking into account the requirements emerging in practice.


REFERENCES CITED



  • 1. EA 1514174.

  • 2. U.S. Pat. No. 5,946,473

  • 3. Nicolay Borisenko, Nguyen Van Long, Alexey Bulygin, Algorithm design software and hardware implementation of large size linear mapping. 2nd Workshop on Current Trends in Cryptology (CTC pt 2013) Jun. 23-25, 2013, Ekaterinburg, Russia. Pre-proceedings, pp. 192-205:

  • 4. Mikhail Borodin, Andrey Rybkin, Alexey Urivskiy. High-Speed Software Implementation of the Prospective 128-bit Block Cipher and Streebog Hash-Function, 3rd Workshop on Current Trends in Cryptology (CTCrypt 2014) Jun. 5-6, 2014, Moscow, Russia. Pre-proceedings, pp. 189-197;

  • 5. Kuzmin A. S., Nechaev A. A., Linear recurring sequences over Galois rings, Algebra and Logic, 3:2 (1995), pp. 169-189;

  • 6. Couselo E., Gonzalez S., Markov V. T., Nechaev A. Recursive MDS-codes and recursively differentiable quasigroups. Discrete Mathematics, Volume 10, Issue 2, 1998, pp. 3-29.


Claims
  • 1. A method of linear transformation of a message S represented in a binary form, by a processor in a computing system having a word size W of the processor equal to an integer power of 2 and an available amount of memory of M bits, the method comprising: setting a size s of the message S, where s is multiple of W;setting a value n of a number of bits of a linear feedback shift register (LFSR) according to a Galois configuration, so that
  • 2. A method of linear transformation of a message S represented in a binary form by a processor in a computing system having a word size W of the processor equal to an integer power of 2 and an available amount of memory of M bits, the method comprising: setting a size s of the message S, where s is multiple of W;setting a value n of a number of bits of a linear feedback shift register (LFSR) according to a Fibonacci configuration, so that
Priority Claims (1)
Number Date Country Kind
2015131963 Jul 2015 RU national
PCT Information
Filing Document Filing Date Country Kind
PCT/RU2016/050024 7/26/2016 WO 00
Publishing Document Publishing Date Country Kind
WO2017/023195 2/9/2017 WO A
US Referenced Citations (7)
Number Name Date Kind
5946473 Lotspiech et al. Aug 1999 A
6925563 Jennings Aug 2005 B1
20020051534 Matchett May 2002 A1
20080240426 Gueron Oct 2008 A1
20100058477 Ciet Mar 2010 A1
20100278338 Chang Nov 2010 A1
20140079215 Wei et al. Mar 2014 A1
Foreign Referenced Citations (4)
Number Date Country
1514174 Nov 2005 EP
2296427 Mar 2007 RU
WO 9945670 Sep 1999 WO
WO 2010132895 Nov 2010 WO
Non-Patent Literature Citations (9)
Entry
Examination Report dated Jul. 31, 2015, issued by the Russian Patent Office (in Russian language) for Russian Patent Application RU2015131963; 2 pages.
Borisenko, Nicolay et al., “Developing algorithm for software and hardware implementation of large size linear mapping”, 2nd Workshop on Current Trends in Cryptology (CTCrypt 2013), Jun. 23-25, 2013, Ekaterinburg, Russia, Pre-proceedings, pp. 192-205.
Borodin, Mikhail et al., “High-Speed Software Implementation of the Prospective 128-bit Block Cipher and Streebog Hash-Function”, 3rd Workshop on Current Trends in Cryptology (CTCrypt 2014), Jun. 5-6, 2014, Moscow, Russia, Pre-proceedings, pp. 189-197.
Kuzmin, A. S. et al, “Linear recurring sequences over Galois rings”, Algebra and Logic, 3:2 (1995), pp. 169-189.
Couselo, E. et al., “A. Recursive MDS-codes and recursively differentiable quasigroups. Discrete Mathematics”, vol. 10, Issue 2, 1998, pp. 3-29.
International Search Report and Written Opinion, issued by the Russian Patent Office (in Russian language), dated Dec. 8, 2016, for International Application No. PCT/RU2016/050024; 6 pages.
English translation of the International Search Report, issued by the Russian Patent Office, dated Dec. 8, 2016, for International Application No. PCT/RU2016/050024; 1 page.
Kuzmin, A.S., et al., “Linear Recurring Sequences Over Galois Rings,” Algebra and Logic, vol. 34, No. 2, 1995.
Couselo, E., et al., “Recursive MDS-codes and recursive differentiable quasigroups,” Discrete Math. Appl, vol. 8, No. 3, pp. 217-245 (1998).
Related Publications (1)
Number Date Country
20170295011 A1 Oct 2017 US