2011
DOI: 10.1049/iet-ifs.2011.0033
|View full text |Cite
|
Sign up to set email alerts
|

On the sliding property of SNOW 3G and SNOW 2.0

Abstract: SNOW 3G is a stream cipher chosen by the 3rd Generation Partnership Project (3GPP) as a crypto-primitive to substitute KASUMI in case its security is compromised. SNOW 2.0 is one of the stream ciphers chosen for the ISO/IEC standard IS 18033-4. In this paper, we show that the initialization procedure of the two ciphers admits a sliding property, resulting in several sets of related-key pairs. In case of SNOW 3G, a set of 2 32 related key pairs is presented, whereas in case of SNOW 2.0, several such sets are fo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
27
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(27 citation statements)
references
References 12 publications
0
27
0
Order By: Relevance
“…At the end of initialization mode, the FSM is performed during one clock cycle, and the associated output word is discarded. Then, the LFSR feedback value is calculated by (4), and the 16 stage registers are updated as follows: For the next clock cycles, the FSM 32-bit output word generated by (5) is mixed with the HC-PRNG 32-bit output word and the register 0 of the LFSR in order to produce the 32-bit keystream word as defined by (20). The architecture of the proposed HC SNOW-3G stream cipher in its keystream mode is given in Figure 6:…”
Section: Keystream Generationmentioning
confidence: 99%
See 1 more Smart Citation
“…At the end of initialization mode, the FSM is performed during one clock cycle, and the associated output word is discarded. Then, the LFSR feedback value is calculated by (4), and the 16 stage registers are updated as follows: For the next clock cycles, the FSM 32-bit output word generated by (5) is mixed with the HC-PRNG 32-bit output word and the register 0 of the LFSR in order to produce the 32-bit keystream word as defined by (20). The architecture of the proposed HC SNOW-3G stream cipher in its keystream mode is given in Figure 6:…”
Section: Keystream Generationmentioning
confidence: 99%
“…This attack is applicable due to the nature of the initialization process of SNOW-3G; such related keys do not generate slid keystreams, but only keystreams that have several equal words. However, this still allows distinguishing the produced keystream from random keystreams [20].…”
Section: Introductionmentioning
confidence: 99%
“…For avoiding access of Z (i) to cryptanalyst during key loading process, DFF is used at output. This DFF will not latch the input string till completion of initialization process [5], [6], [7], [8], [9].…”
Section: Proposed Lili-ii Architecturementioning
confidence: 99%
“…In [11], Yuseop, Kitae, Jaechul and Seokhie had extended the attack proposed in [9] and presented related key chosen IV attacks on Grain-v1 and Grain-128. In [12], Kircanski and Youssef showed that the initialization procedure of SNOW 3G and SNOW 2.0 admits a sliding property, resulting in several sets of related-key pairs. Ding and Guan [13], [14] presented related key chosen IV attacks on K2, Decim v2 and Decim-128 stream ciphers.…”
Section: Introductionmentioning
confidence: 99%