Vectorized linear approximations for attacks on SNOW 3G

被引:14
|
作者
Yang, Jing [1 ]
Johansson, Thomas [1 ]
Maximov, Alexander [2 ]
机构
[1] Lund Univ, Dept Elect & Informat Technol, Lund, Sweden
[2] Ericsson Res, Lund, Sweden
关键词
SNOW; 3G; Stream Cipher; 5G Mobile System Security; CRYPTANALYSIS;
D O I
10.13154/tosc.v2019.i4.249-271
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
SNOW 3G is a stream cipher designed in 2006 by ETSI/SAGE, serving in 3GPP as one of the standard algorithms for data confidentiality and integrity protection. It is also included in the 4G LTE standard. In this paper we derive vectorized linear approximations of the finite state machine in SNOW 3G. In particular, we show one 24-bit approximation with a bias around 2(-37) and one byte-oriented approximation with a bias around 2(-40). We then use the approximations to launch attacks on SNOW 3G. The first approximation is used in a distinguishing attack resulting in an expected complexity of 2(172) and the second one can be used in a standard fast correlation attack resulting in key recovery in an expected complexity of 2(177). If the key length in SNOW 3G would be increased to 256 bits, the results show that there are then academic attacks on such a version faster than the exhaustive key search.
引用
收藏
页码:249 / 271
页数:23
相关论文
共 50 条
  • [1] Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Attacks
    Gong, Xinxin
    Zhang, Bin
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2021, 2021 (02) : 71 - 103
  • [2] Differential attacks on reduced-round SNOW 3G and SNOW 3G⊕
    Ma, Sudong
    Guan, Jie
    IET INFORMATION SECURITY, 2020, 14 (05) : 587 - 594
  • [3] Linear Attacks On SNOW 3G And SNOW-V Using Automatic Search
    Shi, Zhen
    Jin, Chenhui
    COMPUTER JOURNAL, 2023, 66 (05): : 1268 - 1278
  • [4] Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G⊕
    Biryukov, Alex
    Priemuth-Schmid, Deike
    Zhang, Bin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 139 - 153
  • [5] Differential Resynchronization Attacks on Reduced Round SNOW 3G⊕
    Biryukov, Alex
    Priemuth-Schmid, Deike
    Zhang, Bin
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 222 : 147 - 157
  • [6] On the sliding property of SNOW 3G and SNOW 2.0
    Kircanski, A.
    Youssef, A. M.
    IET INFORMATION SECURITY, 2011, 5 (04) : 199 - 206
  • [7] Snow 3G算法分析
    解谦
    现代电信科技, 2011, 41 (06) : 23 - 28
  • [8] Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G
    Xinxin Gong
    Bin Zhang
    Designs, Codes and Cryptography, 2020, 88 : 2407 - 2431
  • [9] Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G
    Gong, Xinxin
    Zhang, Bin
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (11) : 2407 - 2431
  • [10] ANALYSIS OF SNOW 3G⊕ RESYNCHRONIZATION MECHANISM
    Biryukov, Alex
    Priemuth-Schmid, Deike
    Zhang, Bin
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 327 - 333