Comparing Large-unit and Bitwise Linear Approximations of SNOW 2.0 and SNOW 3G and Related Attacks

被引:4
|
作者
Gong, Xinxin [1 ]
Zhang, Bin [1 ,2 ,3 ,4 ]
机构
[1] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[2] Chinese Acad Sci, Inst Software, TCA Lab, SKLCS, Beijing, Peoples R China
[3] Univ Chinese Acad Sci, Beijing 100049, Peoples R China
[4] Guizhou Shujubao Network Technol Co Ltd, Guiyang, Guizhou, Peoples R China
基金
中国国家自然科学基金;
关键词
Stream ciphers; SNOW; 3G; Bitwise linear approximation; Byte-wise linear approximation; Bitwise fast correlation attack;
D O I
10.46586/tosc.v2021.i2.71-103
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper, we study and compare the byte-wise and bitwise linear approximations of SNOW 2.0 and SNOW 3G, and present a fast correlation attack on SNOW 3G by using our newly found bitwise linear approximations. On one side, we reconsider the relation between the large-unit linear approximation and the smaller-unit/bitwise ones derived from the large-unit one, showing that approximations on large-unit alphabets have advantages over all the smaller-unit/bitwise ones in linear attacks. But then on the other side, by comparing the byte-wise and bitwise linear approximations of SNOW 2.0 and SNOW 3G respectively, we have found many concrete examples of 8-bit linear approximations whose certain 1-dimensional/bitwise linear approximations have almost the same SEI (Squared Euclidean Imbalance) as that of the original 8-bit ones. That is, each of these byte-wise linear approximations is dominated by a single bitwise approximation, and thus the whole SEI is not essentially larger than the SEI of the dominating single bitwise approximation. Since correlation attacks can be more efficiently implemented using bitwise approximations rather than large-unit approximations, improvements over the large-unit linear approximation attacks are possible for SNOW 2.0 and SNOW 3G. For SNOW 3G, we make a careful search of the bitwise masks for the linear approximations of the FSM and obtain many mask tuples which yield high correlations. By using these bitwise linear approximations, we mount a fast correlation attack to recover the initial state of the LFSR with the time/memory/data/pre-computation complexities all upper bounded by 2174.16, improving slightly the previous best one which used an 8-bit (vectorized) linear approximation in a correlation attack with all the complexities upper bounded by 2176.56. Though not a significant improvement, our research results illustrate that we have an opportunity to achieve improvement over the large-unit attacks by using bitwise linear approximations in a linear approximation attack, and provide a new insight on the relation between large-unit and bitwise linear approximations.
引用
收藏
页码:71 / 103
页数:33
相关论文
共 10 条
  • [1] Vectorized linear approximations for attacks on SNOW 3G
    Yang, Jing
    Johansson, Thomas
    Maximov, Alexander
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2019, 2019 (04) : 249 - 271
  • [2] Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0
    Zhang, Bin
    Xu, Chao
    Meier, Willi
    ADVANCES IN CRYPTOLOGY, PT I, 2015, 9215 : 643 - 662
  • [3] On the sliding property of SNOW 3G and SNOW 2.0
    Kircanski, A.
    Youssef, A. M.
    IET INFORMATION SECURITY, 2011, 5 (04) : 199 - 206
  • [4] Linear Attacks On SNOW 3G And SNOW-V Using Automatic Search
    Shi, Zhen
    Jin, Chenhui
    COMPUTER JOURNAL, 2023, 66 (05): : 1268 - 1278
  • [5] Differential attacks on reduced-round SNOW 3G and SNOW 3G⊕
    Ma, Sudong
    Guan, Jie
    IET INFORMATION SECURITY, 2020, 14 (05) : 587 - 594
  • [6] Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G⊕
    Biryukov, Alex
    Priemuth-Schmid, Deike
    Zhang, Bin
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2010, 6123 : 139 - 153
  • [7] Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G
    Xinxin Gong
    Bin Zhang
    Designs, Codes and Cryptography, 2020, 88 : 2407 - 2431
  • [8] Fast computation of linear approximation over certain composition functions and applications to SNOW 2.0 and SNOW 3G
    Gong, Xinxin
    Zhang, Bin
    DESIGNS CODES AND CRYPTOGRAPHY, 2020, 88 (11) : 2407 - 2431
  • [9] Differential Resynchronization Attacks on Reduced Round SNOW 3G⊕
    Biryukov, Alex
    Priemuth-Schmid, Deike
    Zhang, Bin
    E-BUSINESS AND TELECOMMUNICATIONS, 2012, 222 : 147 - 157
  • [10] Modified SNOW 3G: Stream Cipher Algorithm Using Piecewise Linear Chaotic Map
    Wasi, Muhammad Arif Ali
    Windarta, Susila
    PROCEEDINGS OF THE 7TH SEAMS UGM INTERNATIONAL CONFERENCE ON MATHEMATICS AND ITS APPLICATIONS 2015: ENHANCING THE ROLE OF MATHEMATICS IN INTERDISCIPLINARY RESEARCH, 2016, 1707