2014
DOI: 10.1109/tifs.2014.2307202
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Lightweight WG-8 Stream Cipher

Abstract: WG-8 is a new lightweight variant of the wellknown Welch-Gong (WG) stream cipher family, and takes an 80-bit secret key and an 80-bit initial vector (IV) as inputs. So far no attack on the WG-8 stream cipher has been published except the attacks by the designers. This paper shows that there exist Key-IV pairs for WG-8 that can generate keystreams, which are exact shifts of each other throughout the keystream generation. By exploiting this slide property, an effective key recovery attack on WG-8 in the related … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 31 publications
(15 citation statements)
references
References 34 publications
0
15
0
Order By: Relevance
“…In comparison with other lightweight stream ciphers, WG‐8 is 2–15 times faster while consuming 2–220 times less energy. A key recovery attack requires 253 chosen IVs to recover the key with 253.32 complexity, for specifically selected key–IV pairs . The provided security level is still adequate for wireless sensor networks (WSN) and RFID tags when these key–IV pairs are avoided.…”
Section: Stream Cipher In Lwcmentioning
confidence: 99%
“…In comparison with other lightweight stream ciphers, WG‐8 is 2–15 times faster while consuming 2–220 times less energy. A key recovery attack requires 253 chosen IVs to recover the key with 253.32 complexity, for specifically selected key–IV pairs . The provided security level is still adequate for wireless sensor networks (WSN) and RFID tags when these key–IV pairs are avoided.…”
Section: Stream Cipher In Lwcmentioning
confidence: 99%
“…A related-key attack is a cryptanalytic attack that can also be applied to a stream cipher and allows to launch a key-recovery attack. In [12], Ding et al proposed a key-recovery attack in the related key settings on WG-8 stream cipher by exploiting the slide property of WG-8 stream cipher. The key-recovery attack has a time complexity of 2 53.32 and needs 2 52 chosen IVs.…”
Section: Related-key Attackmentioning
confidence: 99%
“…Moreover, the WG stream ciphers have provable randomness properties such as long period, balance, 2-level autocorrelation, known linear complexity, and ideal -tuple distribution. Since then, a tremendous research on the other parameters, cryptanalysis and hardware implementation of WG stream ciphers are reported in the literature [34,12,13,25,36,35,42,15].…”
Section: Introductionmentioning
confidence: 99%
“…Let T 3(x) and w(x) be as defined in Eqs (11). and(12), respectively, andg(x) = T 3(x d ) with d = 2 k − 1.The Hadamard transforms of W G w (x) and W G g (x) are as follows: 1) the Hadamard transform of W G w (x) is 3-valued.2) the Hadamard transform of W G g (x) is also at most 5-valued.…”
mentioning
confidence: 99%