×
1 Choose EITC/EITCA Certificates
2 Learn and take online exams
3 Get your IT skills certified

Confirm your IT skills and competencies under the European IT Certification framework from anywhere in the world fully online.

EITCA Academy

Digital skills attestation standard by the European IT Certification Institute aiming to support Digital Society development

LOG IN TO YOUR ACCOUNT

CREATE AN ACCOUNT FORGOT YOUR PASSWORD?

FORGOT YOUR PASSWORD?

AAH, WAIT, I REMEMBER NOW!

CREATE AN ACCOUNT

ALREADY HAVE AN ACCOUNT?
EUROPEAN INFORMATION TECHNOLOGIES CERTIFICATION ACADEMY - ATTESTING YOUR PROFESSIONAL DIGITAL SKILLS
  • SIGN UP
  • LOGIN
  • INFO

EITCA Academy

EITCA Academy

The European Information Technologies Certification Institute - EITCI ASBL

Certification Provider

EITCI Institute ASBL

Brussels, European Union

Governing European IT Certification (EITC) framework in support of the IT professionalism and Digital Society

  • CERTIFICATES
    • EITCA ACADEMIES
      • EITCA ACADEMIES CATALOGUE<
      • EITCA/CG COMPUTER GRAPHICS
      • EITCA/IS INFORMATION SECURITY
      • EITCA/BI BUSINESS INFORMATION
      • EITCA/KC KEY COMPETENCIES
      • EITCA/EG E-GOVERNMENT
      • EITCA/WD WEB DEVELOPMENT
      • EITCA/AI ARTIFICIAL INTELLIGENCE
    • EITC CERTIFICATES
      • EITC CERTIFICATES CATALOGUE<
      • COMPUTER GRAPHICS CERTIFICATES
      • WEB DESIGN CERTIFICATES
      • 3D DESIGN CERTIFICATES
      • OFFICE IT CERTIFICATES
      • BITCOIN BLOCKCHAIN CERTIFICATE
      • WORDPRESS CERTIFICATE
      • CLOUD PLATFORM CERTIFICATENEW
    • EITC CERTIFICATES
      • INTERNET CERTIFICATES
      • CRYPTOGRAPHY CERTIFICATES
      • BUSINESS IT CERTIFICATES
      • TELEWORK CERTIFICATES
      • PROGRAMMING CERTIFICATES
      • DIGITAL PORTRAIT CERTIFICATE
      • WEB DEVELOPMENT CERTIFICATES
      • DEEP LEARNING CERTIFICATESNEW
    • CERTIFICATES FOR
      • EU PUBLIC ADMINISTRATION
      • TEACHERS AND EDUCATORS
      • IT SECURITY PROFESSIONALS
      • GRAPHICS DESIGNERS & ARTISTS
      • BUSINESSMEN AND MANAGERS
      • BLOCKCHAIN DEVELOPERS
      • WEB DEVELOPERS
      • CLOUD AI EXPERTSNEW
  • FEATURED
  • SUBSIDY
  • HOW IT WORKS
  •   IT ID
  • ABOUT
  • CONTACT
  • MY ORDER
    Your current order is empty.
EITCIINSTITUTE
CERTIFIED

What is the maximun period generated by LSFR of degree m?

by Emmanuel Udofia / Tuesday, 06 August 2024 / Published in Cybersecurity, EITC/IS/CCF Classical Cryptography Fundamentals, Stream ciphers, Stream ciphers and linear feedback shift registers

A Linear Feedback Shift Register (LFSR) is a fundamental component in the field of classical cryptography, particularly in the design and implementation of stream ciphers. The maximum period generated by an LFSR of degree m is a topic of significant importance due to its implications on the security and efficiency of cryptographic systems.

An LFSR is essentially a shift register whose input bit is a linear function of its previous state. The 'degree' of an LFSR, denoted as m, refers to the number of stages or flip-flops it contains. The state of the LFSR is typically represented by an m-bit vector, and the linear function that determines the feedback is often represented by a characteristic polynomial.

For an LFSR of degree m, the characteristic polynomial is of the form:

    \[ P(x) = x^m + c_{m-1}x^{m-1} + \cdots + c_1x + c_0 \]

where c_i are coefficients that can be either 0 or 1. The feedback function is defined by this polynomial, and the new bit entering the register is a linear combination of the bits currently in the register, determined by the coefficients c_i.

The maximum period of an LFSR is the length of the sequence before it starts repeating. For an LFSR to achieve its maximum period, the characteristic polynomial must be a primitive polynomial. A primitive polynomial of degree m over the finite field GF(2) (Galois Field of two elements) has the property that it generates all the non-zero elements of GF(2^m) as its sequence of output bits. The maximum period of an LFSR of degree m is:

    \[ 2^m - 1 \]

This period is achieved only if the characteristic polynomial is primitive. If the polynomial is not primitive, the period will be a divisor of 2^m - 1, but it will not reach the maximum possible value.

To illustrate, consider an LFSR of degree 3. The characteristic polynomial for this LFSR could be:

    \[ P(x) = x^3 + x + 1 \]

This polynomial is known to be primitive. Therefore, the LFSR with this characteristic polynomial will have a maximum period of:

    \[ 2^3 - 1 = 7 \]

The sequence generated by this LFSR will go through all possible non-zero 3-bit states before repeating. If we start with an initial state of [1, 0, 0], the sequence of states will be:

1. [1, 0, 0] 2. [0, 1, 0] 3. [0, 0, 1] 4. [1, 1, 0] 5. [0, 1, 1] 6. [1, 0, 1] 7. [1, 1, 1]

After this, the sequence will repeat.

It is important to understand the role of the primitive polynomial in achieving the maximum period. The properties of primitive polynomials are deeply rooted in number theory and algebra. A polynomial P(x) of degree m is primitive if it cannot be factored into polynomials of lower degree over GF(2), and if x is a root of P(x), then x generates the multiplicative group of the field GF(2^m).

Finding primitive polynomials is a non-trivial task. There are known algorithms and tables that list primitive polynomials for various degrees. For practical purposes in cryptographic applications, these precomputed tables are often used to ensure that the LFSR achieves the desired maximum period.

The significance of the maximum period in cryptographic applications cannot be overstated. A longer period implies that the sequence generated by the LFSR will take longer to repeat, which enhances the security of the cryptographic system. In stream ciphers, the keystream generated by the LFSR is used to encrypt the plaintext by combining it with the plaintext bits using the XOR operation. If the period of the LFSR is too short, the keystream will repeat, making the cipher vulnerable to attacks such as the known-plaintext attack.

Consider an example where an LFSR with a non-primitive polynomial is used. Suppose the characteristic polynomial is:

    \[ P(x) = x^3 + x^2 + 1 \]

This polynomial is not primitive. The period of the LFSR with this polynomial will be shorter than 2^3 - 1 = 7. In fact, the period will be 3, as the sequence of states will repeat after 3 steps. Starting with an initial state of [1, 0, 0], the sequence of states will be:

1. [1, 0, 0] 2. [0, 1, 0] 3. [0, 0, 1] 4. [1, 0, 0]

This short period makes the LFSR unsuitable for cryptographic purposes, as the keystream will quickly repeat, exposing the encrypted message to potential attacks.

To ensure the security of stream ciphers, it is essential to use LFSRs with primitive polynomials that guarantee the maximum period. Additionally, the initial state of the LFSR should be chosen carefully to avoid the all-zero state, which would result in a degenerate sequence of all zeros.

In practice, multiple LFSRs are often combined to create more complex keystream generators with longer periods and better statistical properties. One common method is the use of a combination generator, where the outputs of several LFSRs are combined using a nonlinear function. Another method is the use of a shrinking generator, where the output of one LFSR is used to control the output of another LFSR.

The study of LFSRs and their properties is a rich field that intersects with algebra, number theory, and computer science. Understanding the maximum period of an LFSR and the conditions under which it is achieved is fundamental to the design of secure and efficient cryptographic systems.

Other recent questions and answers regarding Stream ciphers and linear feedback shift registers:

  • Can lsfr be used in practical scenerio?
  • What is lsfr
  • Does GSM use two LSFRs coupled together in implementing a stream cipher?
  • Can a linear feedback shift register (LSFR) be implemented using flip flops?
  • What are correlation attacks and algebraic attacks, and how do they exploit the vulnerabilities of single LFSRs?
  • Explain how the A5/1 cipher enhances security by using multiple LFSRs and non-linear functions.
  • How does an LFSR generate a key stream, and what role does the feedback polynomial play in this process?
  • What are the limitations of the one-time pad, and why is it considered impractical for most real-world applications?
  • How does a stream cipher differ from a block cipher in terms of data encryption?
  • With an attack on a single LFSR is it possible to encounter combination of encrypted and decrypted part of the transmission of length 2m from which it is not possible to build solvable linear equations system?

View more questions and answers in Stream ciphers and linear feedback shift registers

More questions and answers:

  • Field: Cybersecurity
  • Programme: EITC/IS/CCF Classical Cryptography Fundamentals (go to the certification programme)
  • Lesson: Stream ciphers (go to related lesson)
  • Topic: Stream ciphers and linear feedback shift registers (go to related topic)
Tagged under: Cryptography, Cybersecurity, LFSR, Maximum Period, Primitive Polynomial, Stream Cipher
Home » Cybersecurity » EITC/IS/CCF Classical Cryptography Fundamentals » Stream ciphers » Stream ciphers and linear feedback shift registers » » What is the maximun period generated by LSFR of degree m?

Certification Center

USER MENU

  • My Account

CERTIFICATE CATEGORY

  • EITC Certification (105)
  • EITCA Certification (9)

What are you looking for?

  • Introduction
  • How it works?
  • EITCA Academies
  • EITCI DSJC Subsidy
  • Full EITC catalogue
  • Your order
  • Featured
  •   IT ID
  • EITCA reviews (Medium publ.)
  • About
  • Contact

EITCA Academy is a part of the European IT Certification framework

The European IT Certification framework has been established in 2008 as a Europe based and vendor independent standard in widely accessible online certification of digital skills and competencies in many areas of professional digital specializations. The EITC framework is governed by the European IT Certification Institute (EITCI), a non-profit certification authority supporting information society growth and bridging the digital skills gap in the EU.
Eligibility for EITCA Academy 90% EITCI DSJC Subsidy support
90% of EITCA Academy fees subsidized in enrolment

    EITCA Academy Secretary Office

    European IT Certification Institute ASBL
    Brussels, Belgium, European Union

    EITC / EITCA Certification Framework Operator
    Governing European IT Certification Standard
    Access contact form or call +32 25887351

    Follow EITCI on X
    Visit EITCA Academy on Facebook
    Engage with EITCA Academy on LinkedIn
    Check out EITCI and EITCA videos on YouTube

    Funded by the European Union

    Funded by the European Regional Development Fund (ERDF) and the European Social Fund (ESF) in series of projects since 2007, currently governed by the European IT Certification Institute (EITCI) since 2008

    Information Security Policy | DSRRM and GDPR Policy | Data Protection Policy | Record of Processing Activities | HSE Policy | Anti-Corruption Policy | Modern Slavery Policy

    Automatically translate to your language

    Terms and Conditions | Privacy Policy
    EITCA Academy
    • EITCA Academy on social media
    EITCA Academy


    © 2008-2026  European IT Certification Institute
    Brussels, Belgium, European Union

    TOP
    CHAT WITH SUPPORT
    Do you have any questions?
    We will reply here and by email. Your conversation is tracked with a support token.