Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic

The Welch-Gong (WG) stream cipher family was designed based on the WG transformation and is able to generate keystreams with mathematically proven randomness properties such as long period, balance, ideal tuple distribution, ideal two-level autocorrelation and high and exact linear complexity. In this paper, we present a compact hardware architecture and its pipelined implementation of the stream cipher WG-16, an efficient instance of the WG stream cipher family, using composite field arithmetic and a newly proposed property of the trace function in tower field representation. Instead of using the original binary field F2^16, we demonstrate that its isomorphic tower field F(((2^2)^2)^2)^2 can lead to a more efficient hardware implementation. Efficient conversion matrices connecting the binary field F2^16 and the tower field F(((2^2)^2)^2)^2 are also derived. Our implementation results show that the pipelined WG-16 hardware core can achieve the throughput of 124 MHz at the cost of 478 slices in an FPGA and 552 MHz at the cost of 12,031 GEs in a 65 nm ASIC, respectively.

[1]  Shuhong Gao,et al.  Optimal normal bases , 1992, Des. Codes Cryptogr..

[2]  M. Aagaard,et al.  Hardware Implementations of Multi-output Welch-Gong Ciphers , .

[3]  Guang Gong,et al.  A Lightweight Stream Cipher WG-7 for RFID Encryption and Authentication , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.

[4]  Guang Gong,et al.  The weakness of integrity protection for LTE , 2013, WiSec '13.

[5]  E. Krengel,et al.  Fast WG stream cipher , 2008, 2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering.

[6]  T. Itoh,et al.  A Fast Algorithm for Computing Multiplicative Inverses in GF(2^m) Using Normal Bases , 1988, Inf. Comput..

[7]  Kazue Sako,et al.  ECRYPT Stream Cipher Project , 2011, Encyclopedia of Cryptography and Security.

[8]  Matthew J. B. Robshaw,et al.  Cryptographic Hardware and Embedded Systems – CHES 2014 , 2014, Lecture Notes in Computer Science.

[9]  Guang Gong,et al.  WG: A family of stream ciphers with designed randomness properties , 2008, Inf. Sci..

[10]  David Canright,et al.  A Very Compact S-Box for AES , 2005, CHES.

[11]  Guang Gong,et al.  An Efficient Stream Cipher WG-16 and its Application for Securing 4G-LTE Networks , 2014 .

[12]  A. M. Abdullah,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1997 .

[13]  Yasuyuki Nogami,et al.  Mixed Bases for Efficient Inversion in F((22)2)2 and Conversion Matrices of SubBytes of AES , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[14]  Guang Gong,et al.  WG-8: A Lightweight Stream Cipher for Resource-Constrained Smart Devices , 2015, EAI Endorsed Trans. Security Safety.

[15]  Flavio D. Garcia,et al.  Gone in 360 Seconds: Hijacking with Hitag2 , 2012, USENIX Security Symposium.

[16]  ItohToshiya,et al.  A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases , 1988 .

[17]  Guang Gong,et al.  New Implementations of the WG Stream Cipher , 2014, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[18]  Guang Gong,et al.  The WG Stream Cipher , 2005 .

[19]  Guang Gong,et al.  Communication System Security , 2012 .