2012
DOI: 10.1007/s12095-012-0070-x
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of WG-7: a lightweight stream cipher

Abstract: Abstract. WG-7 is a stream cipher based on WG Stream Cipher and has been designed by Y. Luo, Q. Chai, G. Gong, and X. Lai in 2010. This cipher is designed for low cost and lightweight applications (RFID tags and mobile phones, for instance). This paper addresses cryptographic weaknesses of WG-7 Stream Cipher. We show that the key stream generated by WG-7 can be distinguished from a random sequence after knowing 2 13.5 keystream bits and with a negligible error probability. Also, we investigate the security of … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
25
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 27 publications
(25 citation statements)
references
References 12 publications
0
25
0
Order By: Relevance
“…For instance, works [23,3,20] present designs of stream ciphers using non-linear filters of linear sequences. Their security is analysed in [14,26,24].…”
Section: Description Of Lf-nlfsrmentioning
confidence: 99%
“…For instance, works [23,3,20] present designs of stream ciphers using non-linear filters of linear sequences. Their security is analysed in [14,26,24].…”
Section: Description Of Lf-nlfsrmentioning
confidence: 99%
“…Recently, Orumiehchiha, Pieprzyk, and Steinfeld [7] discovered a distinguishing attack on W G(7, 23). The main idea is to use the linear relationship among the terms of the m-sequence {a i } generated by the LFSR to build the approximated linear relationship of the WG sequence s i = WG(a i ), i ≥ 0 (here the initialization process is ignored).…”
Section: A Distinguishing Attack On Wg(7 23)mentioning
confidence: 99%
“…Recall that, for W G(7, 23) in [5], the characteristic polynomial of the LFSR p(x) = x 23 + x 11 + β ∈ F 2 7 [x]. Two approximations of the linear equations used in [7] are listed below.…”
Section: A Distinguishing Attack On Wg(7 23)mentioning
confidence: 99%
See 2 more Smart Citations