2019
DOI: 10.46586/tosc.v2019.i3.1-42
|View full text |Cite
|
Sign up to set email alerts
|

A new SNOW stream cipher called SNOW-V

Abstract: In this paper we are proposing a new member in the SNOW family of stream ciphers, called SNOW-V. The motivation is to meet an industry demand of very high speed encryption in a virtualized environment, something that can be expected to be relevant in a future 5G mobile communication system. We are revising the SNOW 3G architecture to be competitive in such a pure software environment, making use of both existing acceleration instructions for the AES encryption round function as well as the ability of modern CP… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
50
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 53 publications
(52 citation statements)
references
References 25 publications
2
50
0
Order By: Relevance
“…• For SNOW-V σ0 , we find a number of bitwise linear approximations which have significantly larger SEI values than that of the best byte-wise linear approximation found in [8], and present a fast correlation attack by using these new-found bitwise linear approximations. This attack costs a time complexity of 2 251.93 and a memory complexity of 2 244 , less than the exhaustive key search, and requires a keystream of length around 2 103.83 , which improves greatly the result in [8] which is 2 203 .…”
Section: Our Contributionsmentioning
confidence: 87%
See 4 more Smart Citations
“…• For SNOW-V σ0 , we find a number of bitwise linear approximations which have significantly larger SEI values than that of the best byte-wise linear approximation found in [8], and present a fast correlation attack by using these new-found bitwise linear approximations. This attack costs a time complexity of 2 251.93 and a memory complexity of 2 244 , less than the exhaustive key search, and requires a keystream of length around 2 103.83 , which improves greatly the result in [8] which is 2 203 .…”
Section: Our Contributionsmentioning
confidence: 87%
“…For SNOW-V, there is no prior cryptanalysis of SNOW-V beyond its design document [8], except for a result published in December 2020 [12] where a byte-based guess and determine attack was proposed with complexity 2 406 . In [8], the designers presented their best results of the linear approximation attacks on several close variants of SNOW-V, including the original version of SNOW-V denoted by SNOW-V σ0 , where the permutation is assumed to be just the identity σ 0 , and also SNOW-V 8 , 8 , where both of the two 32-bit adders " 32 " in the updating function of the FSM are replaced by the 8-bit ones " 8 " while everything else remains identical. In all these analyses, they utilized "large-unit" linear approximations.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations