Author:
Nandi Subrata,Krishnaswamy Srinivasan,Mitra Pinaki
Abstract
In this chapter, we have studied three word-oriented stream ciphers SNOW 1.0, SNOW 2.0 and SNOW 3G in a detailed way. The detailed description includes the working principles of each cipher, security vulnerabilities and implementation issues. It also helps us to study the challenges in each cipher. As SNOW 3G is used as a confidentiality and integrity component in 3G, 4G and 5G communications, the after study of this article may instigate the reader to find the fixes from different cryptanalysis and also find a new suitable design in Mobile telephony security.
Reference35 articles.
1. Daemen J. Rijmen V. Rijndael: Aes proposal; 1999
2. Berlekamp ER. Algebraic coding theory. Negacyclic Codes. 1968:207-217
3. Ekdahl P, Johansson T. Snow—A new stream cipher. In: Proceedings of First Open NESSIE Workshop. KU-Leuven; 2000. pp. 167-168
4. Rose G. A stream cipher based on linear feedback over gf (2 8). In: Australasian Conference on Information Security and Privacy. Springer; 1998. pp. 135-146
5. Rose G, Hawkes P. The t-class of sober stream ciphers. Unpublished manuscript. http://www.home.aone.net.au/qualcomm, 1999
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献