Reference : Analysis of SNOW 3G XOR Resynchronization Mechanism
Scientific congresses, symposiums and conference proceedings : Paper published in a book
Engineering, computing & technology : Computer science
http://hdl.handle.net/10993/17071
Analysis of SNOW 3G XOR Resynchronization Mechanism
English
Biryukov, Alex mailto [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Priemuth-Schmid, Deike [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
Zhang, Bin [University of Luxembourg > Faculty of Science, Technology and Communication (FSTC) > Computer Science and Communications Research Unit (CSC) >]
2010
SECRYPT 2010
327-333
Yes
International
978-989-8425-18-8
SECRYPT 2010
July 26-28, 2010
Athens
Greece
[en] stream cipher ; resynchronization attack ; SNOW 3G
[en] The stream cipher SNOW 3G designed in 2006 by ETSI/SA-GE is a base
algorithm for the second set of 3GPP confidentiality and integrity
algorithms. In this paper, we investigate the resynchronization
security of a close variant of SNOW 3G, in which two modular
additions are replaced by xors and which is called SNOW
3G$^{\oplus}$. It is shown that the feedback from the FSM to the
LFSR is crucial for security. Given a pair of \textit{known} IVs,
the cipher without such a feedback is extremely vulnerable to
differential known IV attacks with practical complexities
($2^{57}$ time and $2^{33}$ keystream). With such a feedback, it
is shown that $16$ out of $33$ initialization rounds can be broken
by a differential \textit{chosen} IV attack. This is the first
public evaluation result for this algorithm.
http://hdl.handle.net/10993/17071
SECRYPT 2010

File(s) associated to this reference

Fulltext file(s):

FileCommentaryVersionSizeAccess
Open access
analysis_of_snow3g-xor-resynchronization.pdfPublisher postprint181.96 kBView/Open

Bookmark and Share SFX Query

All documents in ORBilu are protected by a user license.