Here's some example code that will do the job. To obfuscate a series of byte values, you might find it easier to extract just 8 bits at each iteration. Just XOR these values with your data to obfuscate it, and repeat the process using the same sequence of numbers to retrieve the original data. Obfuscating data with an LFSR:Īs long as your LSFR initially contains a non-zero value, it will step through a sequence of 65535 (2 16–1) pseudorandom values at every iteration. The list of 16-bit LFSRs has 2048 entries. This page contains lists of feedback constants that work with LFSRs of different lengths. (Note: There is no XOR gate feeding into bit 16 because there is no input from bit 17.) Other LFSRs: The quickest way of doing this is by calculating the XOR product of the 16-bit shift register with 0xB400, which has all of these bits set (1011010000000000 in binary). When this bit is zero, this has no effect, but when it is 1, all these bits are flipped. The least significant bit extracted from the end of the shift register is fed back by XOR-ing it with bits 16, 14, 13 and 11. A LFSR has three parameters that characterize the. replaces the vacated bit by the exclusive or ( xor) of the bit shifted off and the bit previously at a given tap position in the register. The Wikipedia article you got this from has an illustration that explains what the code is doing: A linear-feedback shift register (LFSR) is a register of bits that performs discrete step operations that: shifts the bits one position to the left and.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |