Cryptanalysis of WG-8 and WG-16 stream ciphers

被引:4
|
作者
Rostami, Saeed [1 ]
Shakour, Elham [1 ]
Orumiehchiha, Mohammad Ali [2 ]
Pieprzyk, Josef [3 ,4 ]
机构
[1] Zaeim Elect Ind, R&D Dept, Tehran, Iran
[2] Res Ctr Dev Adv Technol, Tehran, Iran
[3] Queensland Univ Technol, Brisbane, Qld, Australia
[4] Polish Acad Sci, Inst Comp Sci, Warsaw, Poland
关键词
WG-8 stream cipher; WG-16 stream cipher; Cryptanalysis; Distinguishing attack; Truth-table enumeration;
D O I
10.1007/s12095-018-0298-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In 2008, the WG family of stream ciphers was designed by Navaz and Gong to secure lightweight applications for RFIDs and smart cards. In 2012, a distinguishing attack was discovered against the WG-7 stream cipher by Orumiehchiha, Pieprzyk and Steinfeld. In 2013, Gong, Aagaard and Fan have re-designed the WG cipher family and claimed that the ciphers are secure if the minimal polynomials of the linear feedback shift registers are properly chosen. This work analyses the security of the WG-8, and WG-16 ciphers from the recently published WG family. It shows that the ciphers are subject to distinguishing attacks that allow an adversary to distinguish WG-8 and WG-16 from random ciphers after observing 249.8 and 263.25 bits, respectively. The attacks use a counting algorithm for the number of zeros and ones of Boolean functions. The algorithm allows to find a bias much quicker than a routine truth-table enumeration.
引用
收藏
页码:351 / 362
页数:12
相关论文
共 50 条
  • [1] Cryptanalysis of WG-8 and WG-16 stream ciphers
    Saeed Rostami
    Elham Shakour
    Mohammad Ali Orumiehchiha
    Josef Pieprzyk
    Cryptography and Communications, 2019, 11 : 351 - 362
  • [2] Cryptanalysis of Lightweight WG-8 Stream Cipher
    Ding, Lin
    Jin, Chenhui
    Guan, Jie
    Wang, Qiuyan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) : 645 - 652
  • [3] Cryptanalysis of WG Family of Stream Ciphers
    Ding, Lin
    Jin, Chenhui
    Guan, Jie
    Zhang, Shaowu
    Cui, Ting
    Han, Dong
    Zhao, Wei
    COMPUTER JOURNAL, 2015, 58 (10): : 2677 - 2685
  • [4] New Hardware Implementations of WG(29,11) and WG-16 Stream Ciphers Using Polynomial Basis
    El-Razouk, Hayssam
    Reyhani-Masoleh, Arash
    Gong, Guang
    IEEE TRANSACTIONS ON COMPUTERS, 2015, 64 (07) : 2020 - 2035
  • [5] A differential fault attack on the WG family of stream ciphers
    Orumiehchiha, Mohammad Ali
    Rostami, Saeed
    Shakour, Elham
    Pieprzyk, Josef
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 189 - 195
  • [6] A differential fault attack on the WG family of stream ciphers
    Mohammad Ali Orumiehchiha
    Saeed Rostami
    Elham Shakour
    Josef Pieprzyk
    Journal of Cryptographic Engineering, 2020, 10 : 189 - 195
  • [7] WG: A family of stream ciphers with designed randomness properties
    Nawaz, Yassir
    Gong, Guang
    INFORMATION SCIENCES, 2008, 178 (07) : 1903 - 1916
  • [8] Cryptanalysis of WG-7: a lightweight stream cipher
    Orumiehchiha, Mohammad Ali
    Pieprzyk, Josef
    Steinfeld, Ron
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2012, 4 (3-4): : 277 - 285
  • [9] Cryptanalysis of WG-7: a lightweight stream cipher
    Mohammad Ali Orumiehchiha
    Josef Pieprzyk
    Ron Steinfeld
    Cryptography and Communications, 2012, 4 : 277 - 285
  • [10] An Efficient Stream Cipher WG-16 and Its Application for Securing 4G-LTE Networks
    Fan, Xinxin
    Wu, Teng
    Gong, Guang
    MECHANICAL DESIGN AND POWER ENGINEERING, PTS 1 AND 2, 2014, 490-491 : 1436 - 1450