Cryptography and Communications

, Volume 6, Issue 2, pp 117–135 | Cite as

Optimal parameters for the WG stream cipher family

  • Kalikinkar Mandal
  • Guang Gong
  • Xinxin Fan
  • Mark Aagaard
Article

Abstract

A general structure of the Welch-Gong (WG) stream cipher family is based on filtering an m-sequence of degree l over a finite field \(\ensuremath{{\mathbb{F}}}_{2^m}\) where the filtering function is a WG transformation from \(\ensuremath{{\mathbb{F}}}_{2^m}\) to \(\ensuremath{{\mathbb{F}}}_{2}\). For a fixed m and l, the linear span of the filtering sequence can be enhanced by increasing the algebraic degree of the WG transformations. This can be accomplished by the composition of a WG transformation with a monomial permutation, which is called the decimation of a WG transformation. In this paper, we first present the new exponent set of WG transformations, and show the existence of exponents derived from the new exponent set for which a decimated WG transformation achieves the maximum algebraic degree. As a result, the linear span of keystreams produced by a decimated WG cipher can be maximized and calculated theoretically. We then give a description of a decimated WG stream cipher which is built upon an LFSR and a decimated WG transformation over an extension field. The randomness properties of keystreams produced by a decimated WG cipher are derived based on the new exponent set. We also discuss the selection criteria for choosing the optimal parameters for the WG cipher family in order to achieve the maximum level of security. Finally, we present the optimal parameters for the WG transformations over \(\ensuremath{{\mathbb{F}}}_{2^m}, 7\leq m \leq 16\) based on the proposed criteria.

Keywords

Welch-Gong (WG) transformations Stream ciphers Boolean functions Sequences 

Mathematics Subject Classification (2010)

94A60 

References

  1. 1.
    Berlekamp, E.R.: Algebraic Coding Theory, Ch. 7. McGraw-Hill, New York (1968)Google Scholar
  2. 2.
    Biryukov, A., Shamir, A.: Cryptanalytic time/memory/data tradeoffs for stream ciphers. In: Advances in Cryptology-Asiacrypt’00. LNCS, vol. 1976, pp. 1–13. Springer, Heidelberg (2000)Google Scholar
  3. 3.
    Courtois, N., Meier, W.: Algebraic attacks on stream ciphers with linear feedback shift registers. In: Advances in Cryptology-Eurocrypt’03. LNCS, vol. 2656, pp. 345–359. Springer, Heidelberg (2003)Google Scholar
  4. 4.
    Dillon, J., Dobbertin, H.: New cyclic difference sets with singer parameters. Finite Fields Appl. 10(3), 342–389 (2004)CrossRefMATHMathSciNetGoogle Scholar
  5. 5.
    Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Advances in Cryptology-EUROCRYPT ’09. LNCS, vol. 5479, pp. 278–299. Springer, Heidelberg (2009)Google Scholar
  6. 6.
    eSTREAM—The ECRYPT Stream Cipher Project: http://www.ecrypt.eu.org/stream/. Accessed Mar 2012
  7. 7.
    Fan, X., Mandal, K., Gong, G.: WG-8: a lightweight stream cipher for resource-constrained smart devices. In: Proceedings of the 9th International Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness (2013)Google Scholar
  8. 8.
    Fan, X., Wu, T., Gong, G.: An efficient stream cipher WG-16 and its application for securing 4G-LTE networks. In: Proceedings of the 3rd International Conference on Communication and Network Security (ICCNS’13). London, UK, 16–17 Nov 2013 (to appear)Google Scholar
  9. 9.
    Golomb, S.W., Gong, G.: Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar. Cambridge University Press, New York (2004)Google Scholar
  10. 10.
    Gong, G., Aagaard, M., Fan, X.: Resilience to distinguishing attacks on WG-7 cipher and their generalizations. Cryptogr. Commun. 5(4), 277–289 (2013)Google Scholar
  11. 11.
    Gong, G., Youssef, A.: Cryptographic properties of the Welch-Gong transformation sequence generators. IEEE Trans. Inf. Theory 48(11), 2837–2846 (2002)CrossRefMATHMathSciNetGoogle Scholar
  12. 12.
    Gong, G., Rønjom, S., Helleseth, T., Hu, H.: Fast discrete fourier spectra attacks on stream ciphers. IEEE Trans. Inf. Theory 57(8), 5555–5565 (2011)CrossRefGoogle Scholar
  13. 13.
    Luo, Y., Chai, Q., Gong, G., Lai, X.: WG-7: a lightweight stream cipher with good cryptographic properties. In: IEEE Global Communications Conference, GLOBECOM’10. pp. 1–6 (2010)Google Scholar
  14. 14.
    Massey, J.L.: Shift-register synthesis and BCH decoding. IEEE Trans. Inf. Theory 15(1), 122–127 (1969)CrossRefMATHMathSciNetGoogle Scholar
  15. 15.
    Meier, W., Staffelbach, O.: Fast correlation attacks on certain stream ciphers. J. Cryptol. 1(3), 159–176 (1989)Google Scholar
  16. 16.
    Nawaz, Y., Gong, G.: WG: a family of stream ciphers with designed randomness properties. Inf. Sci. 178(7), 1903–1916 (2008)CrossRefMATHMathSciNetGoogle Scholar
  17. 17.
    No, J.S., Golomb, S.W., Gong, G., Lee, H.K., Gaal, P.: New binary pseudorandom sequences of period 2n − 1 with ideal autocorrelation. IEEE Trans. Inf. Theory 44(2), 814–817 (1998)CrossRefMATHMathSciNetGoogle Scholar
  18. 18.
    Orumiehchiha, M., Pieprzyk, J., Steinfeld, R.: Cryptanalysis of WG-7: a lightweight stream cipher. Cryptogr. Commun. 4(3–4), 277–285 (2012)CrossRefMATHMathSciNetGoogle Scholar
  19. 19.
    Siegenthaler, T.: Correlation-immunity of nonlinear combining functions for cryptographic applications. IEEE Trans. Inf. Theory 30(5), 776–780 (1984)CrossRefMATHMathSciNetGoogle Scholar
  20. 20.
    Wu, T., Gong, G.: The weakness of integrity protection for LTE. In: The Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec’13), pp. 79–88. ACM Press (2013)Google Scholar
  21. 21.
    Wu, H., Preneel, B.: Chosen IV attack on stream cipher WG. ECRYPT Stream Cipher Project Report 2005/045. Available at http://cr.yp.to/streamciphers/wg/045.pdf. Accessed Apr 2013

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Kalikinkar Mandal
    • 1
  • Guang Gong
    • 1
  • Xinxin Fan
    • 1
  • Mark Aagaard
    • 1
  1. 1.Department of Electrical and Computer EngineeringUniversity of WaterlooWaterlooCanada

Personalised recommendations