Vectorized linear approximations for attacks on SNOW 3G
(2019) 27th Annual Fast Software Encryption Conference, FSE 2020 In IACR Transactions on Symmetric Cryptology 2019(4). p.249-271- Abstract
- SNOW 3G is a stream cipher designed in 2006 by ETSI/SAGE, serving in 3GPP as one of the standard algorithms for data confidentiality and integrity protection. It is also included in the 4G LTE standard. In this paper we derive vectorized linear approximations of the finite state machine in SNOW3G. In particular,we show one 24-bit approximation with a bias around 2−37 and one byte-oriented approximation with a bias around 2−40. We then use the approximations to launch attacks on SNOW 3G. The first approximation is used in a distinguishing attack resulting in an expected complexity of 2172 and the second one can be used in a standard fast correlation attack resulting in key recovery in an expected complexity of 2177. If the key length in... (More)
- SNOW 3G is a stream cipher designed in 2006 by ETSI/SAGE, serving in 3GPP as one of the standard algorithms for data confidentiality and integrity protection. It is also included in the 4G LTE standard. In this paper we derive vectorized linear approximations of the finite state machine in SNOW3G. In particular,we show one 24-bit approximation with a bias around 2−37 and one byte-oriented approximation with a bias around 2−40. We then use the approximations to launch attacks on SNOW 3G. The first approximation is used in a distinguishing attack resulting in an expected complexity of 2172 and the second one can be used in a standard fast correlation attack resulting in key recovery in an expected complexity of 2177. If the key length in SNOW 3G would be increased to 256 bits, the results show that there are then academic attacks on such a version faster than the exhaustive key search. (Less)
Please use this url to cite or link to this publication:
https://lup.lub.lu.se/record/80dd21a7-5111-4af3-89b2-9a9661c040c2
- author
- Yang, Jing LU ; Johansson, Thomas LU and Maximov, Alexander LU
- organization
- publishing date
- 2019
- type
- Chapter in Book/Report/Conference proceeding
- publication status
- published
- subject
- host publication
- Fast Software Encryption conference
- series title
- IACR Transactions on Symmetric Cryptology
- volume
- 2019
- issue
- 4
- pages
- 249 - 271
- conference name
- 27th Annual Fast Software Encryption Conference, FSE 2020
- conference location
- Athens, Greece
- conference dates
- 2020-03-22 - 2020-03-26
- external identifiers
-
- scopus:85079834198
- ISSN
- 2519-173X
- DOI
- 10.13154/tosc.v2019.i4.249-271
- language
- English
- LU publication?
- yes
- id
- 80dd21a7-5111-4af3-89b2-9a9661c040c2
- date added to LUP
- 2019-11-14 23:04:18
- date last changed
- 2023-09-09 17:51:47
@inproceedings{80dd21a7-5111-4af3-89b2-9a9661c040c2, abstract = {{SNOW 3G is a stream cipher designed in 2006 by ETSI/SAGE, serving in 3GPP as one of the standard algorithms for data confidentiality and integrity protection. It is also included in the 4G LTE standard. In this paper we derive vectorized linear approximations of the finite state machine in SNOW3G. In particular,we show one 24-bit approximation with a bias around 2−37 and one byte-oriented approximation with a bias around 2−40. We then use the approximations to launch attacks on SNOW 3G. The first approximation is used in a distinguishing attack resulting in an expected complexity of 2172 and the second one can be used in a standard fast correlation attack resulting in key recovery in an expected complexity of 2177. If the key length in SNOW 3G would be increased to 256 bits, the results show that there are then academic attacks on such a version faster than the exhaustive key search.}}, author = {{Yang, Jing and Johansson, Thomas and Maximov, Alexander}}, booktitle = {{Fast Software Encryption conference}}, issn = {{2519-173X}}, language = {{eng}}, number = {{4}}, pages = {{249--271}}, series = {{IACR Transactions on Symmetric Cryptology}}, title = {{Vectorized linear approximations for attacks on SNOW 3G}}, url = {{http://dx.doi.org/10.13154/tosc.v2019.i4.249-271}}, doi = {{10.13154/tosc.v2019.i4.249-271}}, volume = {{2019}}, year = {{2019}}, }