[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Cryptographic properties of the Welch-Gong transformation sequence generators

Published: 01 September 2006 Publication History

Abstract

Welch-Gong (WG) transformation sequences are binary sequences of period 2n - 1 with two-level autocorrelation. These sequences were discovered by Golomb, Gong, and Gaal (1998) and they verified the validity of their construction for 5 ⩽ n ⩽ 20. Later, No, Chung, and Yun (1998) found another way to construct the WG sequences and verified their result for 5 ⩽ n ⩽ 20. Dillon (1998) first proved this result for odd n, and, finally, Dobbertin and Dillon (1999) proved it for even n. In this paper, we investigate a two-faced property of the WG transformation sequences for application in stream ciphers and pseudorandom number generators. One is to present the randomness or unpredictability of the WG transformation sequences. The other is to exhibit the security properties of the WG transformations regarded as Boolean functions. In particular, we prove that the WG transformation sequences, in addition to the known two-level autocorrelation and three-level cross correlation with m-sequences, have the ideal 2-tuple distribution, and large linear span increasing exponentially with n. Moreover, it can be implemented efficiently. This is the first type of pseudorandom sequences with good correlation, statistic properties, large linear span, and efficient implementation. When WG transformations are regarded as Boolean functions, they have high nonlinearity. We derive a criterion for the Boolean representation of WG transformations to be r-resilient and show that they are at least 1-resilient under some basis of the finite field GF (2n). An algorithm to find such bases is given. The degree and linear span of WG transformations are presented as well

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image IEEE Transactions on Information Theory
IEEE Transactions on Information Theory  Volume 48, Issue 11
November 2002
199 pages

Publisher

IEEE Press

Publication History

Published: 01 September 2006

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)The welch-gong stream cipher - evolutionary pathCryptography and Communications10.1007/s12095-023-00656-016:1(129-165)Online publication date: 1-Jan-2024
  • (2023)Security Analysis of WAGE Against Division Property Based Cube AttackInformation Security Practice and Experience10.1007/978-981-99-7032-2_29(492-506)Online publication date: 24-Aug-2023
  • (2023)An Improved Method for Evaluating Secret Variables and Its Application to WAGEInformation Security and Cryptology10.1007/978-981-97-0942-7_18(360-378)Online publication date: 9-Dec-2023
  • (2019)Cryptanalysis of WG-8 and WG-16 stream ciphersCryptography and Communications10.1007/s12095-018-0298-111:2(351-362)Online publication date: 1-Mar-2019
  • (2019)Lempel-Ziv Compression with Randomized Input-Output for Anti-compression Side-Channel Attacks Under HTTPS/TLSFoundations and Practice of Security10.1007/978-3-030-45371-8_8(117-136)Online publication date: 5-Nov-2019
  • (2018)On ideal t-tuple distribution of filtering de Bruijn sequence generatorsCryptography and Communications10.5555/3197796.319786910:4(629-641)Online publication date: 1-Jul-2018
  • (2016)A survey of lightweight stream ciphers for embedded systemsSecurity and Communication Networks10.1002/sec.13999:10(1226-1246)Online publication date: 10-Jul-2016
  • (2015)New Hardware Implementationsof WG$\bf {(29,11)}$ and WG- $\bf {16}$ StreamCiphers Using Polynomial BasisIEEE Transactions on Computers10.1109/TC.2014.234620764:7(2020-2035)Online publication date: 8-Jun-2015
  • (2014)Optimal parameters for the WG stream cipher familyCryptography and Communications10.1007/s12095-013-0091-06:2(117-135)Online publication date: 1-Jun-2014
  • (2013)Resilience to distinguishing attacks on WG-7 cipher and their generalizationsCryptography and Communications10.1007/s12095-013-0089-75:4(277-289)Online publication date: 1-Dec-2013
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media