Specification of the Stream Cipher WG-16 Based Confidentiality and Integrity Algorithms

The fourth generation of mobile telecommunications system (marketed as 4G-LTE) is being commercially deployed. Security mechanisms are crucial to protect communications of mobile users from potential malicious attacks as well as to ensure revenue for 4G-LTE network operators. The randomness properties of the keystream generated by the current cipher suites in 4G-LTE standard are difficult to analyze and some vulnerabilities in regard to the integrity algorithms have been recently discovered. To address those issues, this technical report gives a detailed specification of a bit-oriented stream cipher WG-16 as well as the corresponding confidentiality and integrity algorithms that can be employed to secure the emerging 4G-LTE networks.

[1]  Nicolas Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[2]  Willi Meier,et al.  Fast correlation attacks on certain stream ciphers , 1989, Journal of Cryptology.

[3]  Ron Steinfeld,et al.  Cryptanalysis of WG-7: a lightweight stream cipher , 2012, Cryptography and Communications.

[4]  Tao Huang,et al.  Differential Attacks against Stream Cipher ZUC , 2012, ASIACRYPT.

[5]  Adi Shamir,et al.  Cube Attacks on Tweakable Black Box Polynomials , 2009, IACR Cryptol. ePrint Arch..

[6]  Guang Gong,et al.  The weakness of integrity protection for LTE , 2013, WiSec '13.

[7]  Bin Zhang,et al.  Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+) , 2010, ACNS.

[8]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[9]  Guang Gong,et al.  Communication System Security , 2012 .

[10]  Thomas Siegenthaler,et al.  Decrypting a Class of Stream Ciphers Using Ciphertext Only , 1985, IEEE Transactions on Computers.

[11]  Guang Gong,et al.  WG: A family of stream ciphers with designed randomness properties , 2008, Inf. Sci..

[12]  Bart Preneel,et al.  Chosen IV Attack on Stream Cipher WG , 2005 .

[13]  Tor Helleseth,et al.  Fast Discrete Fourier Spectra Attacks on Stream Ciphers , 2011, IEEE Transactions on Information Theory.

[14]  Guang Gong,et al.  Resilience to distinguishing attacks on WG-7 cipher and their generalizations , 2013, Cryptography and Communications.

[15]  Jean-René Reinhard,et al.  Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3 , 2011, Selected Areas in Cryptography.

[16]  Alex Biryukov,et al.  Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers , 2000, ASIACRYPT.

[17]  Alex Biryukov,et al.  Differential Resynchronization Attacks on Reduced Round SNOW 3G ⊕ , 2010, ICETE.