Affiliation:
1. Department of Applied Mathematics, PLA SSF Information Engineering University, Zhengzhou, China
Abstract
Abstract
In this paper, a linear attack model of SNOW 3G and SNOW-V based on automatic search technology is proposed. We first describe the linear approximation of Finite State Machine transformation, which allows a wider range of automatic search, then model it with the automatic search technology based on SAT/SMT program. Adopting this generic method, we seek out a binary linear approximation of SNOW 3G with correlation of $2^{-21.92}$ which has been verified by test. Treating this binary approximation as a mask of an 8-bit distribution in a fixed field, we provide a method to obtain the 8-bit distribution. The binary approximation is used in a fast correlation attack with expected time and memory complexity $2^{184.67}$, given $2^{173.96}$ key stream words. For the full version of SNOW-V, considering the linear relationship between Linear Feedback Shift Register parts at three successive moments, we search out a distinguisher with correlation of $2^{-175.51}$, which results in a distinguishing attack with an expected complexity of $2^{351.02}$.
Publisher
Oxford University Press (OUP)
Reference24 articles.
1. Fast correlation attacks on certain stream ciphers;Meier;J. Cryptol.,1989
2. A simple algorithm for fast correlation attacks on stream ciphers;Chepyzhov,2000
3. Fast correlation attacks: An algorithmic point of view;Chose,2002
4. Fast correlation attacks through reconstruction of linear polynomials;Johansson,2000
5. Scream: A software-efficient stream cipher;Halevi,2002
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The Indian Search Algorithm;Lecture Notes in Electrical Engineering;2023