Security Analysis of WG-7 Lightweight Stream Cipher against Cube Attack

06/07/2023
by   Bijoy Das, et al.
0

Welch–Gong (WG) is a hardware-oriented LFSR-based stream cipher. WG-7 is a version of the eStream submission Welch–Gong, used for RFID encryption and authentication purposes. It offers 80-bit cryptographic security. In modern days, almost all ciphers achieve the security by exploiting the nonlinear feedback structure. In this paper, we investigate the security of the nonlinear feedback-based initialization phase of the WG-7 stream cipher using the conventional bit-based division property of cube attack, by considering the cipher in a non-blackbox polynomial setting. In our work, we mount the cube attack using mixed-integer-linear-programming(MILP) models. The results of our attack enable us to recover the secret key of WG-7 after 20 rounds of initialization utilizing 2^10 keystream bits in 2^73 time. We show that our proposed attack takes significantly lower data complexity. To the best of our knowledge, our attack is the first one that investigates the security of the nonlinear feedback-based initialization phase of WG-7 cipher.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/22/2021

An algebraic attack on stream ciphers with application to nonlinear filter generators and WG-PRNG

In this paper, we propose a new algebraic attack on stream ciphers. Star...
research
01/04/2022

An algebraic attack to the Bluetooth stream cipher E0

In this paper we study the security of the Bluetooth stream cipher E0 fr...
research
08/10/2018

A Security Analysis of IoT Encryption: Side-channel Cube Attack on Simeck32/64

Simeck, a lightweight block cipher has been proposed to be one of the en...
research
07/05/2023

A Scheme to resist Fast Correlation Attack for Word Oriented LFSR based Stream Cipher

In LFSR-based stream ciphers, the knowledge of the feedback equation of ...
research
01/17/2019

New family of Stream Ciphers and their applications for Physical Security

In this paper, we propose a new family of stream ciphers based on combin...
research
03/20/2020

The application of σ-LFSR in Key-Dependent Feedback Configuration for Word-Oriented Stream Ciphers

In this paper, we propose and evaluate a method for using σ-LFSRs with k...
research
11/04/2019

Generalized NLFSR Transformation Algorithms and Cryptanalysis of the Class of Espresso-like Stream Ciphers

Lightweight stream ciphers are highly demanded in IoT applications. In o...

Please sign up or login with your details

Forgot password? Click here to reset