June 8, 2023, 1:10 a.m. | Bijoy Das, Abhijit Das, Dipanwita Roy Chowdhury

cs.CR updates on arXiv.org arxiv.org

Welch--Gong (WG) is a hardware-oriented LFSR-based stream cipher. WG-7 is a
version of the eStream submission Welch--Gong, used for RFID encryption and
authentication purposes. It offers 80-bit cryptographic security. In modern
days, almost all ciphers achieve the security by exploiting the nonlinear
feedback structure. In this paper, we investigate the security of the nonlinear
feedback-based initialization phase of the WG-7 stream cipher using the
conventional bit-based division property of cube attack, by considering the
cipher in a non-blackbox polynomial setting. …

analysis attack authentication cipher ciphers cryptographic security cube encryption exploiting feedback hardware rfid security security analysis stream stream cipher version

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Application Security Engineer - Remote Friendly

@ Unit21 | San Francisco,CA; New York City; Remote USA;

Cloud Security Specialist

@ AppsFlyer | Herzliya

Malware Analysis Engineer - Canberra, Australia

@ Apple | Canberra, Australian Capital Territory, Australia

Product CISO

@ Fortinet | Sunnyvale, CA, United States

Manager, Security Engineering

@ Thrive | United States - Remote