Hardware Implementations of Multi-output Welch-Gong Ciphers

The WG family of ciphers provides keystreams with mathematically proven randomness properties such as ideal two-level autocorrelation, balance, long period, ideal tuple distribution, and high and exact linear complexity. In this paper, we extend the mathematical analysis of WG family of ciphers to multioutput WG (MOWG) ciphers and demonstrate that MOWG ciphers provide a large design space of hardware architectures and implementation options with tradeoffs in security, area, and performance, including options that are competitive with the eSTREAM Phase-3 Profile-2 finalists.

[1]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[2]  Josef Pieprzyk,et al.  Cryptanalysis of Block Ciphers with Overdefined Systems of Equations , 2002, ASIACRYPT.

[3]  Kris Gaj,et al.  Comparison of hardware performance of selected Phase II eSTREAM candidates , 2007 .

[4]  Christophe De Cannière,et al.  Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles , 2006, ISC.

[5]  Guang Gong,et al.  Theory and applications of q-ary interleaved sequences , 1995, IEEE Trans. Inf. Theory.

[6]  Adi Shamir,et al.  Fault Analysis of Stream Ciphers , 2004, CHES.

[7]  John F. Dillon,et al.  Multiplicative Difference Sets via Additive Characters , 1999, Des. Codes Cryptogr..

[8]  Claude Carlet,et al.  Algebraic Attacks and Decomposition of Boolean Functions , 2004, EUROCRYPT.

[9]  Martin. Feldhofer Comparison of Low-Power Implementations of Trivium and Grain , 2007 .

[10]  Kaisa Nyberg,et al.  On the Construction of Highly Nonlinear Permutations , 1992, EUROCRYPT.

[11]  Ingrid Verbauwhede,et al.  Energy, performance, area versus security trade-offs for stream ciphers , 2004 .

[12]  Guang Gong,et al.  A Note on Low-Correlation Zone Signal Sets , 2007, IEEE Transactions on Information Theory.

[13]  Hans Dobbertin,et al.  New cyclic difference sets with Singer parameters , 2004, Finite Fields Their Appl..

[14]  Jean-Jacques Quisquater,et al.  FPGA Implementations of eSTREAM Phase-2 Focus Candidates with Hardware Profile , 2007 .

[15]  Tor Helleseth,et al.  On Attacks on Filtering Generators Using Linear Subspace Structures , 2007, SSC.

[16]  Bart Preneel,et al.  Resynchronization Attacks on WG and LEX , 2006, FSE.

[17]  Christine Nadel,et al.  Spread Spectrum Communications Handbook , 2016 .

[18]  Serge Vaudenay,et al.  Links Between Differential and Linear Cryptanalysis , 1994, EUROCRYPT.

[19]  Guang Gong,et al.  Signal Design for Good Correlation: For Wireless Communication, Cryptography, and Radar , 2005 .

[20]  Guang Gong,et al.  WG: A family of stream ciphers with designed randomness properties , 2008, Inf. Sci..

[21]  Nicolas Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[22]  Amr M. Youssef,et al.  Cryptographic properties of the Welch-Gong transformation sequence generators , 2002, IEEE Trans. Inf. Theory.

[23]  Martin Hell,et al.  Grain: a stream cipher for constrained environments , 2007, Int. J. Wirel. Mob. Comput..

[24]  Nicolas Courtois Algebraic Attacks on Combiners with Memory and Several Outputs , 2003, ICISC.

[25]  Berk Sunar,et al.  An Efficient Optimal Normal Basis Type II Multiplier , 2001, IEEE Trans. Computers.

[26]  Kris Gaj,et al.  Comparison of FPGA-Targeted Hardware Implementations of eSTREAM Stream Cipher Candidates , 2008 .