Cryptanalysis of WG Family of Stream Ciphers

被引:8
|
作者
Ding, Lin [1 ]
Jin, Chenhui [1 ]
Guan, Jie [1 ]
Zhang, Shaowu [1 ]
Cui, Ting [1 ]
Han, Dong [1 ]
Zhao, Wei [2 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450000, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
来源
COMPUTER JOURNAL | 2015年 / 58卷 / 10期
基金
中国国家自然科学基金;
关键词
cryptanalysis; related key attack; WG; stream cipher; ATTACKS;
D O I
10.1093/comjnl/bxv024
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The well-known Welch-Gong (WG) stream cipher, proposed by Nawaz and Gong in 2005, was submitted to the hardware profile of the eSTREAM project. In the last several years, the original WG has come under several cryptanalytic attacks. However, as for the final version of WG, no attack has been published on it until now. In this paper, an efficient key recovery attack on the final WG stream cipher in the related key setting is proposed. Under related keys, we can recover the 128-bit secret key of WG-128 with a time complexity of 2(89) and a memory complexity of 2(45). The success probability of the attack is 0.6321. This result shows that our attack on WG-128 is much better than an exhaustive key search in the related key setting. Furthermore, our cryptanalytic results show that WG with IV size no less than 80 bits is vulnerable to a related key attack. The main feature of our attack is that it is independent of the number of steps in the key/IV setup of WG, and then increasing the number of steps in the key/IV setup cannot strengthen the resistance of WG against a related key attack. Finally, a recommended approach to repair the weakness and strengthen the resistance of WG against a related key attack is presented.
引用
收藏
页码:2677 / 2685
页数:9
相关论文
共 50 条
  • [1] Cryptanalysis of WG-8 and WG-16 stream ciphers
    Rostami, Saeed
    Shakour, Elham
    Orumiehchiha, Mohammad Ali
    Pieprzyk, Josef
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2019, 11 (02): : 351 - 362
  • [2] Cryptanalysis of WG-8 and WG-16 stream ciphers
    Saeed Rostami
    Elham Shakour
    Mohammad Ali Orumiehchiha
    Josef Pieprzyk
    Cryptography and Communications, 2019, 11 : 351 - 362
  • [3] Cryptanalysis of MICKEY family of stream ciphers
    Ding, Lin
    Guan, Jie
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) : 936 - 941
  • [4] Cryptanalysis of the FLIP Family of Stream Ciphers
    Duval, Sebastien
    Lallemand, Virginie
    Rotella, Yann
    ADVANCES IN CRYPTOLOGY - CRYPTO 2016, PT I, 2016, 9814 : 457 - 475
  • [5] Linear cryptanalysis of the TSC family of stream ciphers
    Muller, F
    Peyrin, T
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 373 - 394
  • [6] A differential fault attack on the WG family of stream ciphers
    Orumiehchiha, Mohammad Ali
    Rostami, Saeed
    Shakour, Elham
    Pieprzyk, Josef
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2020, 10 (02) : 189 - 195
  • [7] A differential fault attack on the WG family of stream ciphers
    Mohammad Ali Orumiehchiha
    Saeed Rostami
    Elham Shakour
    Josef Pieprzyk
    Journal of Cryptographic Engineering, 2020, 10 : 189 - 195
  • [8] WG: A family of stream ciphers with designed randomness properties
    Nawaz, Yassir
    Gong, Guang
    INFORMATION SCIENCES, 2008, 178 (07) : 1903 - 1916
  • [9] Cryptanalysis of a family of self-synchronizing chaotic stream ciphers
    Arroyo, David
    Alvarez, Gonzalo
    Amigo, Jose Maria
    Li, Shujun
    COMMUNICATIONS IN NONLINEAR SCIENCE AND NUMERICAL SIMULATION, 2011, 16 (02) : 805 - 813
  • [10] Concatenated automata in cryptanalysis of stream ciphers
    Fuster-Sabater, A.
    Caballero-Gil, P.
    CELLULAR AUTOMATA, PROCEEDINGS, 2006, 4173 : 611 - 616