zbmath.org

Document Zbl 1283.94065 - zbMATH Open

Examples

Geometry Search for the term Geometry in any field. Queries are case-independent.

Funct* Wildcard queries are specified by * (e.g. functions, functorial, etc.). Otherwise the search is exact.

"Topological group" Phrases (multi-words) should be set in "straight quotation marks".

au: Bourbaki & ti: Algebra Search for author and title. The and-operator & is default and can be omitted.

so: Eur* J* Mat* Soc* cc: 14 Search for publications in a particular source with a Mathematics Subject Classification code (cc) in 14.

dt: b & au: Hilbert The document type is set to books; alternatively: j for journal articles, a for book articles.

la: chinese Find documents in a given language. ISO 639-1 language codes can also be used.

Fields

any anywhere
an internal document identifier
au author, editor
ai internal author identifier
ti title
la language
so source
ab review, abstract
py publication year
rv reviewer
cc MSC code
ut uncontrolled term
dt document type (j: journal article; b: book; a: book article)

Operators

a & b logic and
a | b logic or
!ab logic not
abc* right wildcard
"ab c" phrase
(ab c) parentheses

See also our General Help.

Resilience to distinguishing attacks on WG-7 cipher and their generalizations. (English) Zbl 1283.94065

Summary: The stream cipher WG-7 is a lightweight variant of the well-known Welch-Gong (WG) stream cipher family, targeted to resource-constrained devices like RFID tags, smart cards, and wireless sensor nodes. Recently, a distinguishing attack was discovered against the stream cipher WG-7 by M. A. Orumiehchiha et al. [Cryptogr. Commun. 4, No. 3–4, 277–285 (2012; Zbl 1285.94087)]. In this paper, we extend their work to a general distinguishing attack and suggest criteria to protect the WG stream cipher family from this attack. Our analysis shows that by properly choosing the minimal polynomial of the linear feedback shift register for a WG stream cipher, the general distinguishing attack can be easily thwarted.


MSC:

References:

[1] Golomb, S., Gong, G.: Signal Design for Good Correlation. Cambridge University Press (2005) · Zbl 1097.94015
[2] Gong, G., Youssef, A.: Cryptographic properties of the Welch-Gong transformation sequence generators. IEEE Trans. Inf. Theory 48(11), 2837–2846 (2002) · Zbl 1062.94027 · doi:10.1109/TIT.2002.804043
[3] Klapper, A., Chan, A.H., Goresky, M.: Cross-correlations of linearly and quadratically related geometric sequences and GMW sequences. Discret. Appl. Math. 46(1), 1–20 (1993) · Zbl 0791.05015 · doi:10.1016/0166-218X(93)90155-H
[4] Lidl, R., Niederreiter, H.: Finite Fields. Cambridge University Press (1997) · Zbl 1139.11053
[5] Luo, Y., Chai, Q., Gong, G., Lai, X.: A lightweight stream cipher WG-7 for RFID encryption and authentication. In: The Proceedings of Global Telecommunications Conference (GLOBECOM 2010), pp. 1–6 (2010)
[6] Mantin, I., Shamir, A.: A practical attack on broadcast RC4. In: Matsui, M. (ed.) The 8th International Workshop on Fast Software Encryption–FSE’01. LNCS, vol. 2355, pp. 152–164. Springer-Verlag, Berlin, Germany (2001) · Zbl 1073.68637
[7] Nawaz, Y., Gong, G.: WG: a family of stream ciphers with designed randomness properties. Inf. Sci. 178(7), 1903–1916 (2008) · Zbl 1211.94034 · doi:10.1016/j.ins.2007.12.002
[8] Orumiehchiha, M., Pieprzyk, J., Steinfeld, R.: Cryptanalysis of WG-7: A Lightweight Stream Cipher. Cryptogr. Commun. 4(3–4), 277–285 (2012) · Zbl 1285.94087 · doi:10.1007/s12095-012-0070-x

This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. In some cases that data have been complemented/enhanced by data from zbMATH Open. This attempts to reflect the references listed in the original paper as accurately as possible without claiming completeness or a perfect matching.