Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

WG-5 is a lightweight stream cipher proposed for usage in the resource-constrained devices, e.g., passive RFID tags, industrial controllers, contactless smart cards and sensors. In this paper, a weakness called of WG-5 which has not been discovered in previous works is for the first time explored and analyzed. The result shows that the probability that two related key-IV pairs of WG-5 generate the shifted keystreams can be up to , which is significantly high compared with an ideal stream cipher that generates the random keystreams. The correctness and accuracy of this theoretical probability is confirmed experimentally. Based on the slide property of WG-5, some key recovery attacks on WG-5 in the related key setting are proposed. The cryptanalytic result shows that the 80-bit secret key of WG-5 can be recovered with a time complexity of , requiring 6 related keys and 80 keystream bits for each of chosen IVs. The experimental result validates our attack and shows that WG-5 can be broken within about 92.054 seconds on a common PC in the related key setting. These results imply that the design of WG-5 is far from optimal and needs to be strengthened to provide enough security for the lightweight constrained applications.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10803906PMC
http://dx.doi.org/10.1016/j.heliyon.2024.e24197DOI Listing

Publication Analysis

Top Keywords

stream cipher
12
wg-5
9
key recovery
8
wg-5 key
8
key setting
8
practical key
4
recovery attack
4
attack lightweight
4
lightweight wg-5
4
wg-5 stream
4

Similar Publications

LWLCM: A novel lightweight stream cipher using logistic chaos function and multiplexer for IoT communications.

PLoS One

September 2025

Department of Computer Science and Artificial Intelligence, College of Computing and Information Technology, University of Bisha, Bisha, Saudi Arabia.

The Internet of Things (IoT) includes vehicles, homes, and integrated sensors and many interconnected physical devices that gather and share data to interact with their environment. Data moving across multiple levels is vulnerable to various security threats, including leaks and unauthorized access. IoT faces significant challenges in balancing strict security with optimal performance metrics such as energy efficiency, throughput, and memory.

View Article and Find Full Text PDF

An ultra-high-order QAM quantum noise stream cipher (QNSC) scheme assisted by intensity and phase chaotic encryption is proposed. In this scheme, the legal transmitter (Alice) first encrypts the original low-order QAM signal into an ultra-high-order QAM signal according to the pre-shared seed key based on the Y-00 protocol, and then conceals the intensity and phase information of the ultra-high-order QAM signal through the intensity and phase chaos generated from a nonlinear delay chaotic source for enhancing the security. The intensity and phase chaotic carrier can be eliminated by the open-loop chaotic synchronization module at the legal receiver (Bob).

View Article and Find Full Text PDF

Securing IoMT data with Algorand blockchain, XChaCha20-Poly1305 encryption, and decentralized storage alternatives.

Sci Rep

July 2025

Department of Computer Science and Engineering, Saveetha School of Engineering, Saveetha Institute of Medical and Technical Sciences, Saveetha University, Chennai, India.

Growing applications of Internet of Medical Things (IoMT) devices have revolutionized the healthcare sector because of remote patient tracking, diagnosis, and data-supported decision-making. The kind of medical data collected from these devices, however, is very sensitive, which makes it very vulnerable to issues of security, privacy, and integrity. This paper suggests a way to keep IoMT data safe using the Algorand blockchain, XChaCha20-Poly1305 encryption, and different types of decentralized storage.

View Article and Find Full Text PDF

A wide range of mathematical constructs, theories, and algorithms have been leveraged by cryptographers to secure valuable and sensitive digital images. Among these, image encryption based on scrambling algorithms has been extensively utilized. These scrambling techniques operate on 1D, 2D, and 3D constructs, relying on pixel-level swapping to enhance security.

View Article and Find Full Text PDF

In the era of large models and big data, the security of optical fiber communication backbone networks has garnered significant attention. Quantum noise stream cipher (QNSC) stands as a crucial method for safeguarding the physical layer security of optical fiber communications, yet the current schemes lag behind the rate capabilities of existing 400G optical fiber backbone networks. In this paper, we introduce deep learning into QNSC and propose an end-to-end quantum noise stream cipher (E2E-QNSC) scheme, which encrypts 16 quadrature amplitude modulation (QAM) into E2E-65536QAM/QNSC.

View Article and Find Full Text PDF