Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

Optimal parameters for the WG stream cipher family

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

A general structure of the Welch-Gong (WG) stream cipher family is based on filtering an m-sequence of degree l over a finite field \(\ensuremath{{\mathbb{F}}}_{2^m}\) where the filtering function is a WG transformation from \(\ensuremath{{\mathbb{F}}}_{2^m}\) to \(\ensuremath{{\mathbb{F}}}_{2}\). For a fixed m and l, the linear span of the filtering sequence can be enhanced by increasing the algebraic degree of the WG transformations. This can be accomplished by the composition of a WG transformation with a monomial permutation, which is called the decimation of a WG transformation. In this paper, we first present the new exponent set of WG transformations, and show the existence of exponents derived from the new exponent set for which a decimated WG transformation achieves the maximum algebraic degree. As a result, the linear span of keystreams produced by a decimated WG cipher can be maximized and calculated theoretically. We then give a description of a decimated WG stream cipher which is built upon an LFSR and a decimated WG transformation over an extension field. The randomness properties of keystreams produced by a decimated WG cipher are derived based on the new exponent set. We also discuss the selection criteria for choosing the optimal parameters for the WG cipher family in order to achieve the maximum level of security. Finally, we present the optimal parameters for the WG transformations over \(\ensuremath{{\mathbb{F}}}_{2^m}, 7\leq m \leq 16\) based on the proposed criteria.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Berlekamp, E.R.: Algebraic Coding Theory, Ch. 7. McGraw-Hill, New York (1968)

    Google Scholar 

  2. Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Advances in Cryptology-Asiacrypt’00. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)

    Google Scholar 

  3. Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback shift registers. In: Advances in Cryptology-Eurocrypt’03. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)

    Google Scholar 

  4. Dillon, J., Dobbertin, H.: New cyclic difference sets with singer parameters. Finite Fields Appl. 10(3), 342–389 (2004)

    Article  MATH  MathSciNet  Google Scholar 

  5. Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Advances in Cryptology-EUROCRYPT ’09. LNCS, vol. 5479, pp. 278–299. Springer, Heidelberg (2009)

    Google Scholar 

  6. eSTREAM—The ECRYPT Stream Cipher Project: http://www.ecrypt.eu.org/stream/. Accessed Mar 2012

  7. Fan, X., Mandal, K., Gong, G.: WG-8: a lightweight stream cipher for resource-constrained smart devices. In: Proceedings of the 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (2013)

  8. Fan, X., Wu, T., Gong, G.: An efficient stream cipher WG-16 and its application for securing 4G-LTE networks. In: Proceedings of the 3rd International Conference on Communication and Network Security (ICCNS’13). London, UK, 16–17 Nov 2013 (to appear)

  9. Golomb, S.W., Gong, G.: Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar. Cambridge University Press, New York (2004)

    Google Scholar 

  10. Gong, G., Aagaard, M., Fan, X.: Resilience to distinguishing attacks on WG-7 cipher and their generalizations. Cryptogr. Commun. 5(4), 277–289 (2013)

    Google Scholar 

  11. Gong, G., Youssef, A.: Cryptographic properties of the Welch-Gong transformation sequence generators. IEEE Trans. Inf. Theory 48(11), 2837–2846 (2002)

    Article  MATH  MathSciNet  Google Scholar 

  12. Gong, G., Rønjom, S., Helleseth, T., Hu, H.: Fast discrete fourier spectra attacks on stream ciphers. IEEE Trans. Inf. Theory 57(8), 5555–5565 (2011)

    Article  Google Scholar 

  13. Luo, Y., Chai, Q., Gong, G., Lai, X.: WG-7: a lightweight stream cipher with good cryptographic properties. In: IEEE Global Communications Conference, GLOBECOM’10. pp. 1–6 (2010)

  14. Massey, J.L.: Shift-register synthesis and BCH decoding. IEEE Trans. Inf. Theory 15(1), 122–127 (1969)

    Article  MATH  MathSciNet  Google Scholar 

  15. Meier, W., Staffelbach, O.: Fast correlation attacks on certain stream ciphers. J. Cryptol. 1(3), 159–176 (1989)

    Google Scholar 

  16. Nawaz, Y., Gong, G.: WG: a family of stream ciphers with designed randomness properties. Inf. Sci. 178(7), 1903–1916 (2008)

    Article  MATH  MathSciNet  Google Scholar 

  17. No, J.S., Golomb, S.W., Gong, G., Lee, H.K., Gaal, P.: New binary pseudorandom sequences of period 2n − 1 with ideal autocorrelation. IEEE Trans. Inf. Theory 44(2), 814–817 (1998)

    Article  MATH  MathSciNet  Google Scholar 

  18. Orumiehchiha, M., Pieprzyk, J., Steinfeld, R.: Cryptanalysis of WG-7: a lightweight stream cipher. Cryptogr. Commun. 4(3–4), 277–285 (2012)

    Article  MATH  MathSciNet  Google Scholar 

  19. Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Inf. Theory 30(5), 776–780 (1984)

    Article  MATH  MathSciNet  Google Scholar 

  20. Wu, T., Gong, G.: The weakness of integrity protection for LTE. In: The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’13), pp. 79–88. ACM Press (2013)

  21. Wu, H., Preneel, B.: Chosen IV attack on stream cipher WG. ECRYPT Stream Cipher Project Report 2005/045. Available at http://cr.yp.to/streamciphers/wg/045.pdf. Accessed Apr 2013

Download references

Acknowledgements

The authors would like to thank Dr. Zilong Wang for his help in proving Theorem 4. The authors also wish to thank the anonymous reviewers for their valuable comments and suggestions to improve the quality of the paper. The research is supported by NSERC SPG and Discovery Grants.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kalikinkar Mandal.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Mandal, K., Gong, G., Fan, X. et al. Optimal parameters for the WG stream cipher family. Cryptogr. Commun. 6, 117–135 (2014). https://doi.org/10.1007/s12095-013-0091-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-013-0091-0

Keywords

Mathematics Subject Classification (2010)

Navigation