Cryptanalysis of WG-8 and WG-16 stream ciphers

被引:4
|
作者
Rostami, Saeed [1 ]
Shakour, Elham [1 ]
Orumiehchiha, Mohammad Ali [2 ]
Pieprzyk, Josef [3 ,4 ]
机构
[1] Zaeim Elect Ind, R&D Dept, Tehran, Iran
[2] Res Ctr Dev Adv Technol, Tehran, Iran
[3] Queensland Univ Technol, Brisbane, Qld, Australia
[4] Polish Acad Sci, Inst Comp Sci, Warsaw, Poland
关键词
WG-8 stream cipher; WG-16 stream cipher; Cryptanalysis; Distinguishing attack; Truth-table enumeration;
D O I
10.1007/s12095-018-0298-1
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In 2008, the WG family of stream ciphers was designed by Navaz and Gong to secure lightweight applications for RFIDs and smart cards. In 2012, a distinguishing attack was discovered against the WG-7 stream cipher by Orumiehchiha, Pieprzyk and Steinfeld. In 2013, Gong, Aagaard and Fan have re-designed the WG cipher family and claimed that the ciphers are secure if the minimal polynomials of the linear feedback shift registers are properly chosen. This work analyses the security of the WG-8, and WG-16 ciphers from the recently published WG family. It shows that the ciphers are subject to distinguishing attacks that allow an adversary to distinguish WG-8 and WG-16 from random ciphers after observing 249.8 and 263.25 bits, respectively. The attacks use a counting algorithm for the number of zeros and ones of Boolean functions. The algorithm allows to find a bias much quicker than a routine truth-table enumeration.
引用
收藏
页码:351 / 362
页数:12
相关论文
共 50 条
  • [41] Multivariate correlation attacks and the cryptanalysis of LFSR-based stream ciphers
    Canales-Martinez, Isaac A.
    Semaev, Igor
    DESIGNS CODES AND CRYPTOGRAPHY, 2024, 92 (11) : 3391 - 3427
  • [42] INTRODUCTION TO THE PAPERS OF WG 8 AFFECT AND MATHEMATICAL THINKING
    Pantziara, Marilena
    Di Martino, Pietro
    Waege, Kjersti
    Schloeglmann, Wolfgang
    PROCEEDINGS OF THE SEVENTH CONGRESS OF THE EUROPEAN SOCIETY FOR RESEARCH IN MATHEMATICS EDUCATION (CERME 7), 2011, : 1165 - 1168
  • [43] A characteristic set method for solving boolean equations and applications in cryptanalysis of stream ciphers*
    Fengjuan CHAI
    Xiao-Shan GAO
    Chunming YUAN
    Journal of Systems Science and Complexity, 2008, 21
  • [44] Cryptanalysis of the class of maximum period galois NLFSR-based stream ciphers
    Yao, Ge
    Parampalli, Udaya
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2021, 13 (05): : 847 - 864
  • [45] Cryptanalysis of Some Self-Synchronous Chaotic Stream Ciphers and Their Improved Schemes
    Chen, Baoju
    Yu, Simin
    Li, David Day-Uei
    Lu, Jinhu
    INTERNATIONAL JOURNAL OF BIFURCATION AND CHAOS, 2021, 31 (08):
  • [46] A CHARACTERISTIC SET METHOD FOR SOLVING BOOLEAN EQUATIONS AND APPLICATIONS IN CRYPTANALYSIS OF STREAM CIPHERS
    Fengjuan CHAI XiaoShan GAO Chunming YUAN Key Laboratory of Mathematics MechanizationInstitute of Systems ScienceAcademy of Mathematics and Systems ScienceChinese Academy of SciencesBeijing China
    Journal of Systems Science and Complexity, 2008, 21 (02) : 191 - 208
  • [47] A CHARACTERISTIC SET METHOD FOR SOLVING BOOLEAN EQUATIONS AND APPLICATIONS IN CRYPTANALYSIS OF STREAM CIPHERS
    Fengjuan CHAI Xiao-Shan GAO Chunming YUAN Key Laboratory of Mathematics Mechanization
    Journal of Systems Science & Complexity, 2008, (02) : 191 - 208
  • [48] Cryptanalysis of the class of maximum period galois NLFSR-based stream ciphers
    Ge Yao
    Udaya Parampalli
    Cryptography and Communications, 2021, 13 : 847 - 864
  • [49] A characteristic set method for solving Boolean equations and applications in cryptanalysis of stream ciphers
    Chai, Fengjuan
    Gao, Xiao-Shan
    Yuan, Chunming
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2008, 21 (02) : 191 - 208
  • [50] Using hadamard transform for cryptanalysis of pseudo-random generators in stream ciphers
    Sosa-Gómez, Guillermo
    Rojas, Omar
    Páez-Osuna, Octavio
    EAI Endorsed Transactions on Energy Web, 2020, 7 (27)