Abstract
A general structure of the Welch-Gong (WG) stream cipher family is based on filtering an m-sequence of degree l over a finite field \(\ensuremath{{\mathbb{F}}}_{2^m}\) where the filtering function is a WG transformation from \(\ensuremath{{\mathbb{F}}}_{2^m}\) to \(\ensuremath{{\mathbb{F}}}_{2}\). For a fixed m and l, the linear span of the filtering sequence can be enhanced by increasing the algebraic degree of the WG transformations. This can be accomplished by the composition of a WG transformation with a monomial permutation, which is called the decimation of a WG transformation. In this paper, we first present the new exponent set of WG transformations, and show the existence of exponents derived from the new exponent set for which a decimated WG transformation achieves the maximum algebraic degree. As a result, the linear span of keystreams produced by a decimated WG cipher can be maximized and calculated theoretically. We then give a description of a decimated WG stream cipher which is built upon an LFSR and a decimated WG transformation over an extension field. The randomness properties of keystreams produced by a decimated WG cipher are derived based on the new exponent set. We also discuss the selection criteria for choosing the optimal parameters for the WG cipher family in order to achieve the maximum level of security. Finally, we present the optimal parameters for the WG transformations over \(\ensuremath{{\mathbb{F}}}_{2^m}, 7\leq m \leq 16\) based on the proposed criteria.
Similar content being viewed by others
References
Berlekamp, E.R.: Algebraic Coding Theory, Ch. 7. McGraw-Hill, New York (1968)
Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Advances in Cryptology-Asiacrypt’00. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)
Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback shift registers. In: Advances in Cryptology-Eurocrypt’03. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)
Dillon, J., Dobbertin, H.: New cyclic difference sets with singer parameters. Finite Fields Appl. 10(3), 342–389 (2004)
Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Advances in Cryptology-EUROCRYPT ’09. LNCS, vol. 5479, pp. 278–299. Springer, Heidelberg (2009)
eSTREAM—The ECRYPT Stream Cipher Project: http://www.ecrypt.eu.org/stream/. Accessed Mar 2012
Fan, X., Mandal, K., Gong, G.: WG-8: a lightweight stream cipher for resource-constrained smart devices. In: Proceedings of the 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (2013)
Fan, X., Wu, T., Gong, G.: An efficient stream cipher WG-16 and its application for securing 4G-LTE networks. In: Proceedings of the 3rd International Conference on Communication and Network Security (ICCNS’13). London, UK, 16–17 Nov 2013 (to appear)
Golomb, S.W., Gong, G.: Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar. Cambridge University Press, New York (2004)
Gong, G., Aagaard, M., Fan, X.: Resilience to distinguishing attacks on WG-7 cipher and their generalizations. Cryptogr. Commun. 5(4), 277–289 (2013)
Gong, G., Youssef, A.: Cryptographic properties of the Welch-Gong transformation sequence generators. IEEE Trans. Inf. Theory 48(11), 2837–2846 (2002)
Gong, G., Rønjom, S., Helleseth, T., Hu, H.: Fast discrete fourier spectra attacks on stream ciphers. IEEE Trans. Inf. Theory 57(8), 5555–5565 (2011)
Luo, Y., Chai, Q., Gong, G., Lai, X.: WG-7: a lightweight stream cipher with good cryptographic properties. In: IEEE Global Communications Conference, GLOBECOM’10. pp. 1–6 (2010)
Massey, J.L.: Shift-register synthesis and BCH decoding. IEEE Trans. Inf. Theory 15(1), 122–127 (1969)
Meier, W., Staffelbach, O.: Fast correlation attacks on certain stream ciphers. J. Cryptol. 1(3), 159–176 (1989)
Nawaz, Y., Gong, G.: WG: a family of stream ciphers with designed randomness properties. Inf. Sci. 178(7), 1903–1916 (2008)
No, J.S., Golomb, S.W., Gong, G., Lee, H.K., Gaal, P.: New binary pseudorandom sequences of period 2n − 1 with ideal autocorrelation. IEEE Trans. Inf. Theory 44(2), 814–817 (1998)
Orumiehchiha, M., Pieprzyk, J., Steinfeld, R.: Cryptanalysis of WG-7: a lightweight stream cipher. Cryptogr. Commun. 4(3–4), 277–285 (2012)
Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Inf. Theory 30(5), 776–780 (1984)
Wu, T., Gong, G.: The weakness of integrity protection for LTE. In: The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’13), pp. 79–88. ACM Press (2013)
Wu, H., Preneel, B.: Chosen IV attack on stream cipher WG. ECRYPT Stream Cipher Project Report 2005/045. Available at http://cr.yp.to/streamciphers/wg/045.pdf. Accessed Apr 2013
Acknowledgements
The authors would like to thank Dr. Zilong Wang for his help in proving Theorem 4. The authors also wish to thank the anonymous reviewers for their valuable comments and suggestions to improve the quality of the paper. The research is supported by NSERC SPG and Discovery Grants.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Mandal, K., Gong, G., Fan, X. et al. Optimal parameters for the WG stream cipher family. Cryptogr. Commun. 6, 117–135 (2014). https://doi.org/10.1007/s12095-013-0091-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-013-0091-0