Cryptanalysis of WG Family of Stream Ciphers

被引:8
作者
Ding, Lin [1 ]
Jin, Chenhui [1 ]
Guan, Jie [1 ]
Zhang, Shaowu [1 ]
Cui, Ting [1 ]
Han, Dong [1 ]
Zhao, Wei [2 ]
机构
[1] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450000, Peoples R China
[2] Sci & Technol Commun Secur Lab, Chengdu 610041, Peoples R China
基金
中国国家自然科学基金;
关键词
cryptanalysis; related key attack; WG; stream cipher; ATTACKS;
D O I
10.1093/comjnl/bxv024
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The well-known Welch-Gong (WG) stream cipher, proposed by Nawaz and Gong in 2005, was submitted to the hardware profile of the eSTREAM project. In the last several years, the original WG has come under several cryptanalytic attacks. However, as for the final version of WG, no attack has been published on it until now. In this paper, an efficient key recovery attack on the final WG stream cipher in the related key setting is proposed. Under related keys, we can recover the 128-bit secret key of WG-128 with a time complexity of 2(89) and a memory complexity of 2(45). The success probability of the attack is 0.6321. This result shows that our attack on WG-128 is much better than an exhaustive key search in the related key setting. Furthermore, our cryptanalytic results show that WG with IV size no less than 80 bits is vulnerable to a related key attack. The main feature of our attack is that it is independent of the number of steps in the key/IV setup of WG, and then increasing the number of steps in the key/IV setup cannot strengthen the resistance of WG against a related key attack. Finally, a recommended approach to repair the weakness and strengthen the resistance of WG against a related key attack is presented.
引用
收藏
页码:2677 / 2685
页数:9
相关论文
共 33 条
[1]  
[Anonymous], 2011, 4 ETSISAGE
[2]  
Banik Subhadeep, 2013, Information Security and Privacy. 18th Australasian Conference, ACISP 2013. Proceedings: LNCS 7959, P13, DOI 10.1007/978-3-642-39059-3_2
[3]  
Biryukov A, 1999, LECT NOTES COMPUT SC, V1636, P245
[4]  
Biryukov A, 2000, LECT NOTES COMPUT SC, V1807, P589
[5]  
Ciet M., 2002, P IEEE INT S INF THE, P315
[6]  
De Cannière C, 2008, LECT NOTES COMPUT SC, V5023, P276
[7]  
Ding L., 2012, 2012696 CRYPT EPRINT
[8]   New Related Key Attacks on the RAKAPOSHI Stream Cipher [J].
Ding, Lin ;
Jin, Chenhui ;
Guan, Jie ;
Zhang, Shaowu ;
Cui, Ting ;
Zhao, Wei .
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 :65-75
[9]   Cryptanalysis of Lightweight WG-8 Stream Cipher [J].
Ding, Lin ;
Jin, Chenhui ;
Guan, Jie ;
Wang, Qiuyan .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) :645-652
[10]   Cryptanalysis of MICKEY family of stream ciphers [J].
Ding, Lin ;
Guan, Jie .
SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (08) :936-941