Skip to main content
Log in

Cryptanalysis of WG-7: a lightweight stream cipher

  • Published:
Cryptography and Communications Aims and scope Submit manuscript

Abstract

WG-7 is a stream cipher based on WG stream cipher and has been designed by Luo et al. (2010). This cipher is designed for low cost and lightweight applications (RFID tags and mobile phones, for instance). This paper addresses cryptographic weaknesses of WG-7 stream cipher. We show that the key stream generated by WG-7 can be distinguished from a random sequence after knowing 213.5 keystream bits and with a negligible error probability. Also, we investigate the security of WG-7 against algebraic attacks. An algebraic key recovery attack on this cipher is proposed. The attack allows to recover both the internal state and the secret key with the time complexity about 227.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Armknecht, F.: Improving fast algebraic attacks. In: FSE, pp. 65–82 (2004)

  2. Armknecht, F., Ars, G.: Introducing a new variant of fast algebraic attacks and minimizing their successive data complexity. In: Mycrypt, pp. 16–32 (2005)

  3. Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Advances in Cryptology - EUROCRYPT 2003, Warsaw, Poland, 2003, Proceedings, pp. 345–359. Springer (2003)

  4. Courtois, N., Pieprzyk, J.: Cryptanalysis of block ciphers with overdefined systems of equations. In: ASIACRYPT, pp. 267–287 (2002)

  5. Courtois, N.T.: Higher order correlation attacks, xl algorithm and cryptanalysis of toyocrypt. In: ICISC 2002, pp. 182–199. Springer (2002)

  6. Courtois, N.T.: Algebraic attacks on combiners with memory and several outputs. In: Proc. of ICISC 04, pp. 3–20 (2004)

  7. Courtois, N.T., Meier, W.: Fast algebraic attacks on stream ciphers with linear feedback. In: Crypto 2003. LNCS, vol. 2729, pp. 177–194. Springer (2003)

  8. Gong, G., Youssef, A.M.: Cryptographic properties of the welch-gong transformation sequence generators. IEEE Trans. Inf. Theory 48(11), 2837–2846 (2002)

    Article  MathSciNet  MATH  Google Scholar 

  9. Hawkes, P., Rose, G.G.: Rewriting variables: the complexity of fast algebraic attacks on stream ciphers. In: CRYPTO, pp. 390–406 (2004)

  10. Luo, Y., Chai, Q., Gong, G., Lai, X.: A lightweight stream cipher wg-7 for rfid encryption and authentication. In: GLOBECOM, pp. 1–6 (2010)

  11. Mantin, I., Shamir, A.: A practical attack on broadcast rc4. In: Proc. of FSE01, pp. 152–164. Springer (2001)

  12. Nawaz, Y., Gong, G.: Wg: a family of stream ciphers with designed randomness properties. Inf. Sci. 178(7), 1903–1916 (2008)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Acknowledgements

Ron Steinfeld and Josef Pieprzyk were supported by the ARC Discovery Grant DP0987734. Ron Steinfeld was also partially supported by the ARC Discovery Grant DP110100628.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohammad Ali Orumiehchiha.

Additional information

This work was done while Ron Steinfeld was with Macquarie University.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Orumiehchiha, M.A., Pieprzyk, J. & Steinfeld, R. Cryptanalysis of WG-7: a lightweight stream cipher. Cryptogr. Commun. 4, 277–285 (2012). https://doi.org/10.1007/s12095-012-0070-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12095-012-0070-x

Keywords

Navigation