Optimal parameters for the WG stream cipher family

被引:0
|
作者
Kalikinkar Mandal
Guang Gong
Xinxin Fan
Mark Aagaard
机构
[1] University of Waterloo,Department of Electrical and Computer Engineering
来源
关键词
Welch-Gong (WG) transformations; Stream ciphers; Boolean functions; Sequences; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
A general structure of the Welch-Gong (WG) stream cipher family is based on filtering an m-sequence of degree l over a finite field \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$\ensuremath{{\mathbb{F}}}_{2^m}$\end{document} where the filtering function is a WG transformation from \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$\ensuremath{{\mathbb{F}}}_{2^m}$\end{document} to \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$\ensuremath{{\mathbb{F}}}_{2}$\end{document}. For a fixed m and l, the linear span of the filtering sequence can be enhanced by increasing the algebraic degree of the WG transformations. This can be accomplished by the composition of a WG transformation with a monomial permutation, which is called the decimation of a WG transformation. In this paper, we first present the new exponent set of WG transformations, and show the existence of exponents derived from the new exponent set for which a decimated WG transformation achieves the maximum algebraic degree. As a result, the linear span of keystreams produced by a decimated WG cipher can be maximized and calculated theoretically. We then give a description of a decimated WG stream cipher which is built upon an LFSR and a decimated WG transformation over an extension field. The randomness properties of keystreams produced by a decimated WG cipher are derived based on the new exponent set. We also discuss the selection criteria for choosing the optimal parameters for the WG cipher family in order to achieve the maximum level of security. Finally, we present the optimal parameters for the WG transformations over \documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$\ensuremath{{\mathbb{F}}}_{2^m}, 7\leq m \leq 16$\end{document} based on the proposed criteria.
引用
收藏
页码:117 / 135
页数:18
相关论文
共 50 条
  • [1] Optimal parameters for the WG stream cipher family
    Mandal, Kalikinkar
    Gong, Guang
    Fan, Xinxin
    Aagaard, Mark
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2014, 6 (02): : 117 - 135
  • [2] On Selection of Optimal Parameters for the WG Stream Cipher Family
    Mandal, Kalikinkar
    Gong, Guang
    Fan, Xinxin
    Aagaard, Mark
    2013 13TH CANADIAN WORKSHOP ON INFORMATION THEORY (CWIT), 2013, : 17 - 21
  • [3] Fast WG Stream Cipher
    Krengel, Evgeny
    2008 IEEE REGION 8 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNOLOGIES IN ELECTRICAL AND ELECTRONICS ENGINEERING: SIBIRCON 2008, PROCEEDINGS, 2008, : 31 - 35
  • [4] Improved Attack on WG Stream Cipher
    Mirzaei, Arash
    Dakhilalian, Mohammad
    Modarres-Hashemi, Mahmoud
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (04): : 45 - 52
  • [5] New Implementations of the WG Stream Cipher
    El-Razouk, Hayssam
    Reyhani-Masoleh, Arash
    Gong, Guang
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2014, 22 (09) : 1865 - 1878
  • [6] Implementation of WG Stream Cipher with Involution Function
    Ashan, V. C.
    INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING, SCIENCE AND TECHNOLOGY (ICETEST - 2015), 2016, 24 : 790 - 795
  • [7] Cryptanalysis of Lightweight WG-8 Stream Cipher
    Ding, Lin
    Jin, Chenhui
    Guan, Jie
    Wang, Qiuyan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (04) : 645 - 652
  • [8] Cryptanalysis of WG-7: a lightweight stream cipher
    Orumiehchiha, Mohammad Ali
    Pieprzyk, Josef
    Steinfeld, Ron
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2012, 4 (3-4): : 277 - 285
  • [9] Cryptanalysis of WG-7: a lightweight stream cipher
    Mohammad Ali Orumiehchiha
    Josef Pieprzyk
    Ron Steinfeld
    Cryptography and Communications, 2012, 4 : 277 - 285
  • [10] Cryptanalysis of WG Family of Stream Ciphers
    Ding, Lin
    Jin, Chenhui
    Guan, Jie
    Zhang, Shaowu
    Cui, Ting
    Han, Dong
    Zhao, Wei
    COMPUTER JOURNAL, 2015, 58 (10): : 2677 - 2685