The welch-gong stream cipher - evolutionary path

نویسندگان

چکیده

Abstract This survey presents the rich history of Welch-Gong (WG) Stream cipher family. It has been a long journey that lead WG stream ciphers to become practical. The evolutionary path is combination mathematical endeavour and engineering striving transfer pure functions practical encryption algorithms for various applications. began as pioneering work on transformation sequences with 2-level autocorrelation, leading important breakthroughs in early 2000’s, such submission first eSTREAM competition 2005 subsequent introduction family ( m , l ), followed by extensive particular instances proposed (mostly lightweight) A recent construction using permutation authenticated WAGE, submitted NIST LWC 2019. story far not finished. future opens numerous possibilities applications both lightweight environments high-performance computing. We conclude new ideas open problems.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Welch-Gong Transformation Sequence Generators

Welch-Gong (WG) transformation sequences are binary sequences of period 2 − 1 with 2-level auto correlation. These sequences were discovered by Golomb, Gong and Gaal in 1998 and verified for 5 ≤ n ≤ 20. Later on, No, Chung and Yun found another way to construct the WG sequences and verified their result for 5 ≤ n ≤ 23. Dillon first proved this result for odd n in 1998, and finally, Dobbertin an...

متن کامل

Cryptographic properties of the Welch-Gong transformation sequence generators

Welch–Gong (WG) transformation sequences are binary sequences of period 2 1 with two-level autocorrelation. These sequences were discovered by Golomb, Gong, and Gaal in 1998 and they verified the validity of their construction for 5 20. Later, No, Chung, and Yun found another way to construct the WG sequences and verified their result for 5 23. Dillon first proved this result for odd in 1998, a...

متن کامل

The rakaposhi Stream Cipher

In this paper, we introduce the rakaposhi stream cipher. The algorithm is based on Dynamic Linear Feedback Shift Registers, with a simple and potentially scalable design, and is particularly suitable for hardware applications with restricted resources. The rakaposhi stream cipher offers 128-bit security, and aims to complement the current eSTREAM portfolio of hardware-oriented stream ciphers.

متن کامل

The Stream Cipher Rabbit

1 This is version 1.1 of the cipher specification as submitted to the eStream project. The only changes in comparison to version 1.0 are some additions to section 7 on computational efficiency and a new appendix A, which describes an 80-bit key setup.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cryptography and Communications

سال: 2023

ISSN: ['1936-2455', '1936-2447']

DOI: https://doi.org/10.1007/s12095-023-00656-0