首页> 外文会议>International workshop on lightweight cryptography for security and privacy >Distinguishing Attacks on (Ultra-)Lightweight WG Ciphers
【24h】

Distinguishing Attacks on (Ultra-)Lightweight WG Ciphers

机译:区分(超)轻型WG密码的攻击

获取原文

摘要

The Welch-Gong (WG) family of stream ciphers include two subfamilies, which we call WG-A and WG-B, of patented (ultra-) lightweight ciphers designed by Gong et al. The Waterloo Commercialization Office, Canada, has included the WG-A in an RFID anti-counterfeiting system and has proposed the WG-B for securing 4G networks. The WG-A and WG-B ciphers support 80- and 128-bit keys, respectively. In this paper, we detect input-output correlations in the nonlinear transformations used by these ciphers. Exploiting these, we show distinguishing attacks that require, to nearly ensure success, between 2~(22.20) and 2~(29.07) keystream samples for WG-A and not more than 2~(56.84) keystream samples for WG-B. We are not aware of any prior attacks on these ciphers.
机译:Welch-Gong(WG)流密码家族包括两个子家族,我们称为WG-A和WG-B,它们是Gong等人设计的专利(超)轻量级密码。加拿大滑铁卢商业化办公室已将WG-A纳入RFID防伪系统中,并提出了WG-B以保护4G网络安全。 WG-A和WG-B密码分别支持80位和128位密钥。在本文中,我们检测了这些密码所使用的非线性变换中的输入-输出相关性。利用这些,我们展示了区分攻击,它们几乎需要确保WG-A的2〜(22.20)和2〜(29.07)个密钥流样本之间的匹配,而对于WG-B则不超过2〜(56.84)个密钥流样本。我们之前没有发现对这些密码的任何攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号