Cryptanalysis of WG-8 and WG-16 stream ciphers

被引:4
|
作者
Rostami, Saeed [1 ]
Shakour, Elham [1 ]
Orumiehchiha, Mohammad Ali [2 ]
Pieprzyk, Josef [3 ,4 ]
机构
[1] Zaeim Elect Ind, R&D Dept, Tehran, Iran
[2] Res Ctr Dev Adv Technol, Tehran, Iran
[3] Queensland Univ Technol, Brisbane, Qld, Australia
[4] Polish Acad Sci, Inst Comp Sci, Warsaw, Poland
关键词
WG-8 stream cipher; WG-16 stream cipher; Cryptanalysis; Distinguishing attack; Truth-table enumeration;
D O I
10.1007/s12095-018-0298-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In 2008, the WG family of stream ciphers was designed by Navaz and Gong to secure lightweight applications for RFIDs and smart cards. In 2012, a distinguishing attack was discovered against the WG-7 stream cipher by Orumiehchiha, Pieprzyk and Steinfeld. In 2013, Gong, Aagaard and Fan have re-designed the WG cipher family and claimed that the ciphers are secure if the minimal polynomials of the linear feedback shift registers are properly chosen. This work analyses the security of the WG-8, and WG-16 ciphers from the recently published WG family. It shows that the ciphers are subject to distinguishing attacks that allow an adversary to distinguish WG-8 and WG-16 from random ciphers after observing 249.8 and 263.25 bits, respectively. The attacks use a counting algorithm for the number of zeros and ones of Boolean functions. The algorithm allows to find a bias much quicker than a routine truth-table enumeration.
引用
收藏
页码:351 / 362
页数:12
相关论文
共 50 条
  • [21] IEC SC-29 C/WG-12 CALIBRATION OF CONDENSER MICROPHONES AND IEC SC-29 C/WG-16 SPECIFICATION FOR MEASUREMENT MICROPHONES
    不详
    PTB-MITTEILUNGEN, 1986, 96 (02): : 113 - 113
  • [22] Distinguishing Attacks on (Ultra-)Lightweight WG Ciphers
    Joseph, Mabin
    Sekar, Gautham
    Balasubramanian, R.
    LIGHTWEIGHT CRYPTOGRAPHY FOR SECURITY AND PRIVACY, 2017, 10098 : 45 - 59
  • [23] Improved Attack on WG Stream Cipher
    Mirzaei, Arash
    Dakhilalian, Mohammad
    Modarres-Hashemi, Mahmoud
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (04): : 45 - 52
  • [24] New Implementations of the WG Stream Cipher
    El-Razouk, Hayssam
    Reyhani-Masoleh, Arash
    Gong, Guang
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2014, 22 (09) : 1865 - 1878
  • [25] New Cryptanalysis of Irregularly Decimated Stream Ciphers
    Zhang, Bin
    SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 449 - 465
  • [26] Linear cryptanalysis of the TSC family of stream ciphers
    Muller, F
    Peyrin, T
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 373 - 394
  • [27] Deep Learning based Cryptanalysis of Stream Ciphers
    Mishra, Girish
    Gupta, Indivar
    Murthy, S. V. S. S. N. V. G. Krishna
    Pal, S. K.
    DEFENCE SCIENCE JOURNAL, 2021, 71 (04) : 499 - 506
  • [28] Optimal parameters for the WG stream cipher family
    Kalikinkar Mandal
    Guang Gong
    Xinxin Fan
    Mark Aagaard
    Cryptography and Communications, 2014, 6 : 117 - 135
  • [29] Optimal parameters for the WG stream cipher family
    Mandal, Kalikinkar
    Gong, Guang
    Fan, Xinxin
    Aagaard, Mark
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2014, 6 (02): : 117 - 135
  • [30] Implementation of WG Stream Cipher with Involution Function
    Ashan, V. C.
    INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 790 - 795