Proceedings of the 3rd International Workshop on Trustworthy Embedded Devices 2013
DOI: 10.1145/2517300.2517305
|View full text |Cite
|
Sign up to set email alerts
|

Efficient hardware implementation of the stream cipher WG-16 with composite field arithmetic

Abstract: The Welch-Gong (WG) stream cipher family was designed based on the WG transformation and is able to generate keystreams with mathematically proven randomness properties such as long period, balance, ideal tuple distribution, ideal two-level autocorrelation and high and exact linear complexity. In this paper, we present a compact hardware architecture and its pipelined implementation of the stream cipher WG-16, an efficient instance of the WG stream cipher family, using composite field arithmetic and a newly pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 12 publications
(25 reference statements)
0
12
0
Order By: Relevance
“…The reason is that building WG-8 permutation/transformation module with an 8×8 look-up table occupies smaller area than using logic equations and multipliers. However, when the size of finite field increases, the medium and large instances of WG stream cipher family will benefit from the tower construction, thereby achieving a better performance, as illustrated in [13].…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…The reason is that building WG-8 permutation/transformation module with an 8×8 look-up table occupies smaller area than using logic equations and multipliers. However, when the size of finite field increases, the medium and large instances of WG stream cipher family will benefit from the tower construction, thereby achieving a better performance, as illustrated in [13].…”
Section: Resultsmentioning
confidence: 99%
“…Although there is no Gaussian normal basis over F 2 8 , the above nice property of trace function still holds if we use the isomorphic tower field construction F ((2 2 ) 2 ) 2 in Section 3.4. The following proposition and two corollaries characterize the aforementioned property and the proofs are direct adaptation of those in [13].…”
Section: Properties Of the Trace Function Under The Tower Constructionmentioning
confidence: 98%
See 2 more Smart Citations
“…For mapping of GF (2 16 ) to GF (2 8 ) irreducible polynomial is used which contain constant μ. They performed the multiplication with an assumed value for the constant μ [3]. In the literature published till date, design methodologies of a Galois field multiplier and theory based on pipelining has been presented.…”
Section: Isomorphic Mapping and Inverse Isomorphic Mappingmentioning
confidence: 99%