File:An analysis of cryptographically significant Boolean functions with high correlation immunity by reconfigurable computer (IA annalysisofcrypt109455003).pdf

From Wikimedia Commons, the free media repository
Jump to navigation Jump to search
Go to page
next page →
next page →
next page →

Original file(1,275 × 1,650 pixels, file size: 563 KB, MIME type: application/pdf, 131 pages)

Captions

Captions

Add a one-line explanation of what this file represents

Summary[edit]

An analysis of cryptographically significant Boolean functions with high correlation immunity by reconfigurable computer   (Wikidata search (Cirrus search) Wikidata query (SPARQL)  Create new Wikidata item based on this file)
Author
Etherington, Carole J.
image of artwork listed in title parameter on this page
Title
An analysis of cryptographically significant Boolean functions with high correlation immunity by reconfigurable computer
Publisher
Monterey, California. Naval Postgraduate School
Description

Boolean functions with high correlation immunity can be used in cryptosystems to defend against correlation attacks. These functions are rare and difficult to find. As the variables increase, this task becomes exponentially more complex and time consuming. Three different ways to execute a program to find the correlation immunity of a function are compared in this thesis. First, a program was written in C and executed on a conventional CPU. The same program was then executed on an FPGA on the SRC-6 reconfigurable computer. A similar program was written in Verilog and executed on the FPGA. By taking advantage of the parallel processing ability of the SRC-6, a wellprogrammed Verilog macro can find functions with high correlation immunity at a much faster rate. The SRC-6 reconfigurable computer is used in this thesis to find the correlation immunity of millions of functions up to six variables. Rotation symmetric and balanced functions were examined to find subsets that contain a high percentage of functions with good correlation immunity. The nonlinearity and correlation immunity of functions of four and five variables were compared to find functions with the best balance to fend off both correlation and linear attacks on a cryptosystem.


Subjects: Electrical engineering; Cryptography
Language English
Publication date December 2010
Current location
IA Collections: navalpostgraduateschoollibrary; fedlink
Accession number
annalysisofcrypt109455003
Source
Internet Archive identifier: annalysisofcrypt109455003
https://archive.org/download/annalysisofcrypt109455003/annalysisofcrypt109455003.pdf
Permission
(Reusing this file)
This publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. As such, it is in the public domain, and under the provisions of Title 17, United States Code, Section 105, may not be copyrighted.

Licensing[edit]

Public domain
This work is in the public domain in the United States because it is a work prepared by an officer or employee of the United States Government as part of that person’s official duties under the terms of Title 17, Chapter 1, Section 105 of the US Code. Note: This only applies to original works of the Federal Government and not to the work of any individual U.S. state, territory, commonwealth, county, municipality, or any other subdivision. This template also does not apply to postage stamp designs published by the United States Postal Service since 1978. (See § 313.6(C)(1) of Compendium of U.S. Copyright Office Practices). It also does not apply to certain US coins; see The US Mint Terms of Use.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current12:12, 14 July 2020Thumbnail for version as of 12:12, 14 July 20201,275 × 1,650, 131 pages (563 KB) (talk | contribs)FEDLINK - United States Federal Collection annalysisofcrypt109455003 (User talk:Fæ/IA books#Fork8) (batch 1993-2020 #7268)

Metadata