A Guess-And-Determine Attack On SNOW-V Stream Cipher

Author:

Jiao Lin1,Li Yongqiang23,Hao Yonglin1

Affiliation:

1. State Key Laboratory of Cryptology, PO Box 5159, Beijing, China

2. State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences,100093, Beijing, China

3. School of Cyber Security, University of Chinese Academy of Sciences, 100049, Beijing, China

Abstract

Abstract The 5G mobile communication system is coming with a main objective, known also as IMT-2020, that intends to increase the current data rates up to several gigabits per second. To meet an accompanying demand of the super high-speed encryption, EIA and EEA algorithms face some challenges. The 3GPP standardization organization expects to increase the security level to 256-bit key length, and the international cryptographic field responds actively in cipher designs and standard applications. SNOW-V is such a proposal offered by the SNOW family design team, with a revision of the SNOW 3G architecture in terms of linear feedback shift register (LFSR) and finite state machine (FSM), where the LFSR part is new and operates eight times the speed of the FSM, consisting of two shift registers and each feeding into the other, and the FSM increases to three 128-bit registers and employs two instances of full AES encryption round function for update. It takes a 128-bit IV, employs 896-bit internal state and produces 128-bit keystream blocks. The result is competitive in pure software environment, making use of both AES-NI and AVX acceleration instructions. Thus, the security evaluation of SNOW-V is essential and urgent, since there is scarcely any definite security bound for it. In this paper, we propose a byte-based guess-and-determine attack on SNOW-V with complexity $2^{406}$ using only seven keystream blocks. We first improve the heuristic guessing-path auto-searching algorithm based on dynamic programming by adding initial guessing set, which is iteratively modified by sieving out the unnecessary guessing variables, in order to correct the guessing path according to the cipher structure and finally launch smaller guessing basis. For the specific design, we split all the computing units into bytes and rewrite all the internal operations correspondingly. We establish a backward-clock linear equation system according to the circular construction of the LFSR part. Then we further simplify the equations to adapt to the input requirements of the heuristic guessing-path auto-searching algorithm. Finally, the derived guessing path needs modification for the pre-simplification and post-reduction. This is the first complete guess-and-determine attack on SNOW-V as well as the first specific security evaluation to the full cipher.

Funder

National Natural Science Foundation of China

Youth Innovation Promotion Association CAS

Publisher

Oxford University Press (OUP)

Subject

General Computer Science

Reference15 articles.

1. Specification of the 3GPP confidentiality and integrity algorithms UEA2 & UIA2. Document 2: SNOW 3G specification;SAGE,2006

2. Specification of the 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3. Document 2: ZUC specification;SAGE,2011

3. The ZUC-256 stream cipher,2018

4. A new SNOW stream cipher called SNOW-V;Ekdahl;IACR Trans. Symmetric Cryptol.,2018

Cited by 23 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Theoretical Linear Cryptanalysis of the 5G Standard Candidate SNOW 5G;IACR Transactions on Symmetric Cryptology;2024-06-18

2. Cryptanalysis of Strumok Cipher Initialization;Tatra Mountains Mathematical Publications;2024-05-29

3. Revealing Modern Stream Ciphers Security: A Comprehensive Review;2023 International Conference on Engineering Applied and Nano Sciences (ICEANS);2023-10-25

4. Various Techniques of Cryptanalysis, Their Challenges and Remedial Solutions;2023 3rd Asian Conference on Innovation in Technology (ASIANCON);2023-08-25

5. Correlation attacks on SNOW-V-like stream ciphers based on a heuristic MILP model;IEEE Transactions on Information Theory;2023

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3