![]() ![]() Working with image makes me working with large field of data, Kb files. It says: "Despite this simplicity, there are currently no known attacks better than exhaustive search when the feedback polynomials are secret" ![]() The ' + 1 ' of the polynomial ( X 0) is usually always. Since your polynomial is X 5 + X 2 + 1 the feedback is an XOR of the output of the 2nd tap ( R 3) and the 5th tap ( R 0 ). Note that in your diagram the first tap is R 4, the 2nd is R 3 etc. In the wikipedia article they recommend to use combination of several LFSR, we could use 2 LFSR, one could tell if we use the current output bit from the other one shrinking generator The taps are decided by the polynomial in a straightforward way: for X n, you connect the n th tap. I would like to use LFSR to generate a stream cypher in each Core of the GPU. I am currently working on a project which consist in the encryption of image using the GPU of a raspberry. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |