Proceedings of the 6th International Conference on Security of Information and Networks 2013
DOI: 10.1145/2523514.2523533
|View full text |Cite
|
Sign up to set email alerts
|

SAT based analysis of LTE stream cipher ZUC

Abstract: Mobile security is of paramount importance. The security of LTE (long term evolution of radio networks), which is currently widely deployed as a long-term standard for mobile networks, relies upon three cryptographic primitives, among which the stream cipher ZUC. In this paper, we point out that the linear feedback shift register (LFSR) used in ZUC has about 2 25 encodings of the zero state (i.e. all LFSR variables are 0) due to the fact that operations are performed modulo 2 31 1 on 32-bit operands. We use SA… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 15 publications
0
4
0
Order By: Relevance
“…Therefore, with the exception of the Trivium and ZUC ciphers, the proposed chaos-based stream ciphers have competitive hardware performance when compared to most other chaotic and non-chaotic systems. Nevertheless, since 2007, several kinds of attacks have been launched against the eSTREAM cipher and ZUC stream cipher, revealing several vulnerabilities to cryptanalysis attacks [3,[41][42][43][44]. Note: Nowadays, promising new fractional chaotic functions have appeared, which seem very robust against cryptographic attacks.…”
Section: Correlation Analysismentioning
confidence: 99%
“…Therefore, with the exception of the Trivium and ZUC ciphers, the proposed chaos-based stream ciphers have competitive hardware performance when compared to most other chaotic and non-chaotic systems. Nevertheless, since 2007, several kinds of attacks have been launched against the eSTREAM cipher and ZUC stream cipher, revealing several vulnerabilities to cryptanalysis attacks [3,[41][42][43][44]. Note: Nowadays, promising new fractional chaotic functions have appeared, which seem very robust against cryptographic attacks.…”
Section: Correlation Analysismentioning
confidence: 99%
“…As soon as R1 or R2 can be chosen,weak states can be reached for reduced round versions, although the numberof satisfiable instances decreases as a function of the number of rounds. Theseweak state have no concern to the security feature of ZUC [6] [7].…”
Section: Guess-and-determine Attack[5]mentioning
confidence: 99%
“…In [ZFL11], a differential trail covering 24 rounds of the initialization stage is given, but this does not pose a threat since ZUC has 32 initialization rounds. [LMVH15] also shows that weak inputs do not exist in ZUC when it is initialized with 32 rounds. These results indicate that ZUC is resistant against common attacks.…”
Section: Introductionmentioning
confidence: 97%