574 research outputs found

    A Family of Binary Sequences with Optimal Correlation Property and Large Linear Span

    Full text link
    A family of binary sequences is presented and proved to have optimal correlation property and large linear span. It includes the small set of Kasami sequences, No sequence set and TN sequence set as special cases. An explicit lower bound expression on the linear span of sequences in the family is given. With suitable choices of parameters, it is proved that the family has exponentially larger linear spans than both No sequences and TN sequences. A class of ideal autocorrelation sequences is also constructed and proved to have large linear span.Comment: 21 page

    Full-length non-linear binary sequences with Zero Correlation Zone for multiuser communications

    Get PDF
    none3noThe research on new sets of sequences that can be applied as spreading codes in multiple user communications is still an active area, even if this topic has been extensively investigated since long time. In fact, new communication paradigms like dense and decentralized wireless networks, where there is no central controller to assign the resources to the nodes, are revamping the interest on finding large sets of sequences providing adequate correlation properties to support a big number of nodes, in potentially hostile channels. This paper focuses on the Zero Correlation Zone (ZCZ) property exhibited by a family of nonlinear binary sequences featuring a great cardinality of their set, and good security-related features, and provides evidence of their suitability to multiuser communications, in channels affected by multipath.Sarayloo, M.; Gambi, E.; Spinsante, S.Sarayloo, Mahdiyar; Gambi, Ennio; Spinsante, Susann

    Full-length non-linear binary sequences with Zero Correlation Zone for multiuser communications

    Get PDF
    The research on new sets of sequences to be used asspreading codes in multiple user communications is still an activearea, despite the great amount of literature available since manyyears on this topic. In fact, new paradigms like dense anddecentralized wireless networks, where there is no centralcontroller to assign the resources to the nodes, are revamping theinterest on large sets of sequences providing adequate correlationproperties to support a big number of nodes, in potentially hostilechannels. This paper focuses on the Zero Correlation Zone (ZCZ)property exhibited by a family of non-linear binary sequencesfeaturing a great cardinality of their set and good securityrelatedfeatures, and provides evidence of their suitability tomultiuser communications, in channels affected by multipath

    Design and Analysis of Cryptographic Pseudorandom Number/Sequence Generators with Applications in RFID

    Get PDF
    This thesis is concerned with the design and analysis of strong de Bruijn sequences and span n sequences, and nonlinear feedback shift register (NLFSR) based pseudorandom number generators for radio frequency identification (RFID) tags. We study the generation of span n sequences using structured searching in which an NLFSR with a class of feedback functions is employed to find span n sequences. Some properties of the recurrence relation for the structured search are discovered. We use five classes of functions in this structured search, and present the number of span n sequences for 6 <= n <= 20. The linear span of a new span n sequence lies between near-optimal and optimal. According to our empirical studies, a span n sequence can be found in the structured search with a better probability of success. Newly found span n sequences can be used in the composited construction and in designing lightweight pseudorandom number generators. We first refine the composited construction based on a span n sequence for generating long de Bruijn sequences. A de Bruijn sequence produced by the composited construction is referred to as a composited de Bruijn sequence. The linear complexity of a composited de Bruijn sequence is determined. We analyze the feedback function of the composited construction from an approximation point of view for producing strong de Bruijn sequences. The cycle structure of an approximated feedback function and the linear complexity of a sequence produced by an approximated feedback function are determined. A few examples of strong de Bruijn sequences with the implementation issues of the feedback functions of an (n+16)-stage NLFSR are presented. We propose a new lightweight pseudorandom number generator family, named Warbler family based on NLFSRs for smart devices. Warbler family is comprised of a combination of modified de Bruijn blocks (CMDB) and a nonlinear feedback Welch-Gong (WG) generator. We derive the randomness properties such as period and linear complexity of an output sequence produced by the Warbler family. Two instances, Warbler-I and Warbler-II, of the Warbler family are proposed for passive RFID tags. The CMDBs of both Warbler-I and Warbler-II contain span n sequences that are produced by the structured search. We analyze the security properties of Warbler-I and Warbler-II by considering the statistical tests and several cryptanalytic attacks. Hardware implementations of both instances in VHDL show that Warbler-I and Warbler-II require 46 slices and 58 slices, respectively. Warbler-I can be used to generate 16-bit random numbers in the tag identification protocol of the EPC Class 1 Generation 2 standard, and Warbler-II can be employed as a random number generator in the tag identification as well as an authentication protocol for RFID systems.1 yea

    Topics on Register Synthesis Problems

    Get PDF
    Pseudo-random sequences are ubiquitous in modern electronics and information technology. High speed generators of such sequences play essential roles in various engineering applications, such as stream ciphers, radar systems, multiple access systems, and quasi-Monte-Carlo simulation. Given a short prefix of a sequence, it is undesirable to have an efficient algorithm that can synthesize a generator which can predict the whole sequence. Otherwise, a cryptanalytic attack can be launched against the system based on that given sequence. Linear feedback shift registers (LFSRs) are the most widely studied pseudorandom sequence generators. The LFSR synthesis problem can be solved by the Berlekamp-Massey algorithm, by constructing a system of linear equations, by the extended Euclidean algorithm, or by the continued fraction algorithm. It is shown that the linear complexity is an important security measure for pseudorandom sequences design. So we investigate lower bounds of the linear complexity of different kinds of pseudorandom sequences. Feedback with carry shift registers (FCSRs) were first described by Goresky and Klapper. They have many good algebraic properties similar to those of LFSRs. FCSRs are good candidates as building blocks of stream ciphers. The FCSR synthesis problem has been studied in many literatures but there are no FCSR synthesis algorithms for multi-sequences. Thus one of the main contributions of this dissertation is to adapt an interleaving technique to develop two algorithms to solve the FCSR synthesis problem for multi-sequences. Algebraic feedback shift registers (AFSRs) are generalizations of LFSRs and FCSRs. Based on a choice of an integral domain R and π ∈ R, an AFSR can produce sequences whose elements can be thought of elements of the quotient ring R/(π). A modification of the Berlekamp-Massey algorithm, Xu\u27s algorithm solves the synthesis problem for AFSRs over a pair (R, π) with certain algebraic properties. We propose two register synthesis algorithms for AFSR synthesis problem. One is an extension of lattice approximation approach but based on lattice basis reduction and the other one is based on the extended Euclidean algorithm

    Nonlinear Suppression of Range Ambiguity in Pulse Doppler Radar

    Get PDF
    Coherent pulse train processing is most commonly used in airborne pulse Doppler radar, achieving adequate transmitter/receiver isolation and excellent resolution properties while inherently inducing ambiguities in Doppler and range. First introduced by Palermo in 1962 using two conjugate LFM pulses, the primary nonlinear suppression objective involves reducing range ambiguity, given the waveform is nominally unambiguous in Doppler, by using interpulse and intrapulse coding (pulse compression) to discriminate received ambiguous pulse responses. By introducing a nonlinear operation on compressed (undesired) pulse responses within individual channels, ambiguous energy levels are reduced in channel outputs. This research expands the NLS concept using discrete coding and processing. A general theory is developed showing how NLS accomplishes ambiguity surface volume removal without requiring orthogonal coding. Useful NLS code sets are generated using combinatorial, simulated annealing optimization techniques - a general algorithm is developed to extended family size, code length, and number of phases (polyphase coding). An adaptive reserved code thresholding scheme is introduced to efficiently and effectively track the matched filter response of a target field over a wide dynamic range, such as normally experienced in airborne radar systems. An evaluation model for characterizing NLS clutter suppression performance is developed - NLS performance is characterized using measured clutter data with analysis indicating the proposed technique performs relatively well even when large clutter cells exist

    Partial period autocorrelations of geometric sequences

    Full text link

    Heuristic search of (semi-)bent functions based on cellular automata

    Get PDF
    An interesting thread in the research of Boolean functions for cryptography and coding theory is the study of secondary constructions: given a known function with a good cryptographic profile, the aim is to extend it to a (usually larger) function possessing analogous properties. In this work, we continue the investigation of a secondary construction based on cellular automata (CA), focusing on the classes of bent and semi-bent functions. We prove that our construction preserves the algebraic degree of the local rule, and we narrow our attention to the subclass of quadratic functions, performing several experiments based on exhaustive combinatorial search and heuristic optimization through Evolutionary Strategies (ES). Finally, we classify the obtained results up to permutation equivalence, remarking that the number of equivalence classes that our CA-XOR construction can successfully extend grows very quickly with respect to the CA diameter
    • …
    corecore