New Implementations of the WG Stream Cipher

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Improved Attack on WG Stream Cipher

WG is a synchronous stream cipher submitted to the hardware profile of eSTREAM project. The main feature of this stream cipher is the use of WG transformation. WG uses keys and initial vectors (IVs) of the same lengths 80, 96, 112 and 128 bits. Moreover, IVs of the length 32 and 64 bits are admitted. The most important key recovery attack on WG was presented by Wu and Preneel and uses the weakn...

متن کامل

New Hardware Implementations of WG(29, 11) and WG-16 Stream Ciphers Using Polynomial Basis

The WG stream ciphers are based on the WG (Welch-Gong) transformation and possess proved randomness properties. In this paper we propose nine new hardware designs for the two classes of WG(29, 11) and WG-16. For each class, we design and implement three versions of standard, pipelined and serial. For the first time, we use the polynomial basis (PB) representation to design and implement the WG(...

متن کامل

SNOW - a new stream cipher?

In this paper a new word-oriented stream cipher, called SNOW, is proposed. The design of the cipher is quite simple, consisting of a linear feedback shift register, feeding a nite state machine. The design goals of producing a stream cipher signi cantly faster than AES, with signi cantly lower implementation costs in hardware, and a security level similar to AES is currently met. Our fastest C ...

متن کامل

A New Stream Cipher: Dicing

In this paper, we will propose a new synchronous stream cipher named DICING, which can be viewed as a clock-controlled one but with a new mechanism of altering steps. With the simple construction, DICING has satisfactory performance, faster than AES about two times. For the security, there have not been found weakness for the known attacks, the key sizes can be 128bits and 256bits respectively. .

متن کامل

Nofish - A new stream cipher

The purpose of this paper is to provide a description of the Nofish cryptographic algorithm. This paper is intended to release the algorithm to the cryptographic community, for its future analysis and possible use. The name of the algorithm comes in respect to other well-known secure crypto algorithms like Blowfish and Twofish and since this one has not gained this status, I call it Nofish. 1. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Very Large Scale Integration (VLSI) Systems

سال: 2014

ISSN: 1063-8210,1557-9999

DOI: 10.1109/tvlsi.2013.2280092