{"title":"快速WG流密码","authors":"E. Krengel","doi":"10.1109/SIBIRCON.2008.4602594","DOIUrl":null,"url":null,"abstract":"In this paper, we present a new implementation of the WG stream cipher for data security in communications. The implementation is based on the interleaved approach with precomputation only the WG transformation sequence and precomputation of shift sequence is not required. It works 8 times faster than known implementation of the WG stream cipher proposed by Nawaz and Gong. The new implementation requires storage for saving of the WG transformation sequence but it is more simple in development because all computations are carried out by modulo 2.","PeriodicalId":295946,"journal":{"name":"2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Fast WG stream cipher\",\"authors\":\"E. Krengel\",\"doi\":\"10.1109/SIBIRCON.2008.4602594\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper, we present a new implementation of the WG stream cipher for data security in communications. The implementation is based on the interleaved approach with precomputation only the WG transformation sequence and precomputation of shift sequence is not required. It works 8 times faster than known implementation of the WG stream cipher proposed by Nawaz and Gong. The new implementation requires storage for saving of the WG transformation sequence but it is more simple in development because all computations are carried out by modulo 2.\",\"PeriodicalId\":295946,\"journal\":{\"name\":\"2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering\",\"volume\":\"14 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-07-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SIBIRCON.2008.4602594\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 IEEE Region 8 International Conference on Computational Technologies in Electrical and Electronics Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIBIRCON.2008.4602594","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper, we present a new implementation of the WG stream cipher for data security in communications. The implementation is based on the interleaved approach with precomputation only the WG transformation sequence and precomputation of shift sequence is not required. It works 8 times faster than known implementation of the WG stream cipher proposed by Nawaz and Gong. The new implementation requires storage for saving of the WG transformation sequence but it is more simple in development because all computations are carried out by modulo 2.