5.2. FURTHER WORK 31 It should be possible to apply the <strong>for</strong>mula of the MSK scheme to the generator, in order to derive FSM modules <strong>for</strong> arbitrary segment numbers at generator runtime. Though the MSK algorithm has been evaluated manually <strong>for</strong> the interesting range of segments the general mathematical proof is still interesting. Actually, there are people working on the proof and it is probable that the MSK scheme will soon be proven. Acknowledgment The author would like to thank Markus Ernst and Michael Jung <strong>for</strong> their great help and support.
Bibliography [1] National Institute of Standards and Technology, “Data Encryption Standard,” Federal In<strong>for</strong>mation Processing Standard (FIPS) Publication 46-2 (supercedes FIPS-46-1), http://www.itl.nist.gov/div897/pubs/fip46-2.htm, December 1993. [2] National Institute of Standards and Technology, “Specification <strong>for</strong> the Advanced Encryption Standard (AES),” Federal In<strong>for</strong>mation Processing Standard (FIPS) Publication 197, http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, November 26, 2001. [3] Internet Engineering Task Force, “The TLS Protocol,” RFC 2246, http://www.ietf.org/rfc/rfc2246.txt, January 1999. [4] R. L. Rivest, A. Shamir and L. M. Adleman, “A Method <strong>for</strong> Obtaining Digital Signatures and Public- Key Cryptosystems,” Communications of the ACM, Feb 1978. [5] V. Miller, “Use of elliptic curves in cryptography,” Advances in Cryptology, Proc. CRYPTO’85, LNCS 218, H. C. Williams, Ed., Springer-Verlag, pp. 417–426, 1986. [6] N. Koblitz, “<strong>Elliptic</strong> <strong>Curve</strong> Cryptosystems,” Mathematics of Computation, vol. 48, pp. 203–209, 1987. [7] A. Lenstra and E. Verheul, “Selecting Cryptographic Key Sizes,” Proc. Workshop on Practice and Theory in Public Key <strong>Cryptography</strong>, Springer-Verlag, ISBN 3540669671, pp. 446–465, 2000. [8] Xilinx, “Programmable Logic Data Book,” 2001. [9] Atmel, Inc. “Configurable Logic Data Book,” 2001. [10] M. Ernst, S. Klupsch, O. Hauck and S. A. Huss, “Rapid Prototyping <strong>for</strong> <strong>Hardware</strong> Accelerated <strong>Elliptic</strong> <strong>Curve</strong> Public-Key Cryptosystems,” Proc. 12th IEEE Workshop on Rapid System Prototyping (RSP01), Monterey, CA, June 2001. [11] A. J. Menezes, “<strong>Elliptic</strong> <strong>Curve</strong> Public Key Cryptosystems,” Kluwer Akademic Publishers, 1993. [12] J. H. Silverman, “The Arithmetic of <strong>Elliptic</strong> <strong>Curve</strong>s,” Graduate Texts in Mathematics, Springer- Verlag, 1986. [13] IEEE 1363, “Standard Specifications For Public Key <strong>Cryptography</strong>,” http://grouper.ieee.org/groups/1363/, 2000. [14] ANSI X9.62, “Public key cryptography <strong>for</strong> the financial services industry: The <strong>Elliptic</strong> <strong>Curve</strong> Digital Signature Algorithm (ECDSA),” (available from the ANSI X9 catalog), 1999.