The welch-gong stream cipher - evolutionary path
نویسندگان
چکیده
Abstract This survey presents the rich history of Welch-Gong (WG) Stream cipher family. It has been a long journey that lead WG stream ciphers to become practical. The evolutionary path is combination mathematical endeavour and engineering striving transfer pure functions practical encryption algorithms for various applications. began as pioneering work on transformation sequences with 2-level autocorrelation, leading important breakthroughs in early 2000’s, such submission first eSTREAM competition 2005 subsequent introduction family ( m , l ), followed by extensive particular instances proposed (mostly lightweight) A recent construction using permutation authenticated WAGE, submitted NIST LWC 2019. story far not finished. future opens numerous possibilities applications both lightweight environments high-performance computing. We conclude new ideas open problems.
منابع مشابه
On Welch-Gong Transformation Sequence Generators
Welch-Gong (WG) transformation sequences are binary sequences of period 2 − 1 with 2-level auto correlation. These sequences were discovered by Golomb, Gong and Gaal in 1998 and verified for 5 ≤ n ≤ 20. Later on, No, Chung and Yun found another way to construct the WG sequences and verified their result for 5 ≤ n ≤ 23. Dillon first proved this result for odd n in 1998, and finally, Dobbertin an...
متن کاملCryptographic properties of the Welch-Gong transformation sequence generators
Welch–Gong (WG) transformation sequences are binary sequences of period 2 1 with two-level autocorrelation. These sequences were discovered by Golomb, Gong, and Gaal in 1998 and they verified the validity of their construction for 5 20. Later, No, Chung, and Yun found another way to construct the WG sequences and verified their result for 5 23. Dillon first proved this result for odd in 1998, a...
متن کاملThe rakaposhi Stream Cipher
In this paper, we introduce the rakaposhi stream cipher. The algorithm is based on Dynamic Linear Feedback Shift Registers, with a simple and potentially scalable design, and is particularly suitable for hardware applications with restricted resources. The rakaposhi stream cipher offers 128-bit security, and aims to complement the current eSTREAM portfolio of hardware-oriented stream ciphers.
متن کاملThe Stream Cipher Rabbit
1 This is version 1.1 of the cipher specification as submitted to the eStream project. The only changes in comparison to version 1.0 are some additions to section 7 on computational efficiency and a new appendix A, which describes an 80-bit key setup.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cryptography and Communications
سال: 2023
ISSN: ['1936-2455', '1936-2447']
DOI: https://doi.org/10.1007/s12095-023-00656-0