2018
DOI: 10.1007/s12095-018-0298-1
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of WG-8 and WG-16 stream ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…A distinguishing attack was proposed against the WG-7 stream cipher in [OPS12], which was successful due to a small number of tap positions in the characteristic polynomial of the LFSR of WG-7. Applying a similar distinguishing attack of [RSOP19,OPS12], a distinguisher of WG-PRBG can be written as…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…A distinguishing attack was proposed against the WG-7 stream cipher in [OPS12], which was successful due to a small number of tap positions in the characteristic polynomial of the LFSR of WG-7. Applying a similar distinguishing attack of [RSOP19,OPS12], a distinguisher of WG-PRBG can be written as…”
Section: Discussionmentioning
confidence: 99%
“…For the distinguisher F , the probability of F (x) = 0 can be written as Pr(F (x) = 0) = 1 2 ± for some . Using the counting algorithm in [RSOP19], the value of is 2 −20.405 . Therefore, the time and data complexities of the distinguishing attack is O(2 40.81 ) for distinguishing the outputs of WG-PRBG from a truly random one.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…It was submitted to the NIST lightweight cryptography standardization competition [12] and became one of 32 Round 2 candidates of this competition. Due to the novelty in design, the WG family of stream ciphers has attracted a lot of attention in recent years, and several attacks on them have been proposed in [13] , [14] , [15] , [16] , [17] , [18] , [19] .…”
Section: Introductionmentioning
confidence: 99%