A New Version of the Stream Cipher SNOW

  title={A New Version of the Stream Cipher SNOW},
  author={Patrik Ekdahl and Thomas Johansson},
  booktitle={Selected Areas in Cryptography},
In 2000, the stream cipher SNOW was proposed. A few attacks followed, indicating certain weaknesses in the design. In this paper we propose a new version of SNOW, called SNOW 2.0. The new version of the cipher does not only appear to be more secure, but its implementation is also a bit faster in software. 
Design and Analysis of A New Secure Stream Cipher Algorithm
A new word-oriented stream cipher algorithm with a key length of 256 bit is designed and analyzed and is much more resistant than other similar ciphers against distinguishing and known attacks.
Fault Analysis of the Stream Cipher Snow 3G
  • B. Debraize, I. Corbella
  • Computer Science, Mathematics
    2009 Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC)
  • 2009
A fault attack against Snow 3G is proposed, which recovers the secret key with only 22 fault injections, and aims to improve the security of this backup encryption algorithm.
The WG Stream Cipher
A new synchronous stream cipher, called WG cipher, based on WG (Welch-Gong) transformations, designed to produce keystream with guaranteed randomness properties, which is resistant to Time/Memory/Data tradeoff attacks, algebraic attacks and correlation attacks.
International standards for stream ciphers : A progress report
The main objective of this paper is to review the current status of stream cipher standardisation. The hope is that, by doing so, the algorithms and techniques that are likely to be standardised at
The Grain Family of Stream Ciphers
A new family of stream ciphers, Grain, is proposed, based on two shift registers and a nonlinear output function, that have the additional feature that the speed can be easily increased at the expense of extra hardware.
Strumok stream cipher: Specification and basic properties
STRUMOK aims at improving SNOW 2.0 both from the security and from the efficiency points of view, most notably, it uses a more productive keystream generation procedure.
Turing: A Fast Stream Cipher
This paper proposes the Turing stream cipher, which combines an LFSR generator based on that of SOBER with a keyed mixing function reminiscent of a block cipher round, and is designed for extremely efficient software implementation.
Side-Channel Analysis of the K2 Stream Cipher
This paper provides the first side-channel analysis of the K2 stream cipher, a fast and secure stream cipher built upon the strengths of SNOW 2.0, and shows that naively implemented K2 is vulnerable to cache-timing attacks.
A New Stream Cipher Based on Nonlinear Dynamic System
A security analysis has been carried out and it has been showed that the output sequence produced by the scheme is pseudorandom in the sense that they cannot be distinguished from truly random sequence and resist to well-known stream cipher attacks.
Grain: a stream cipher for constrained environments
A new stream cipher, Grain, is proposed, which targets hardware environments where gate count, power consumption and memory is very limited and has the additional feature that the speed can be increased at the expense of extra hardware.


SNOW - A new stream cipher
A new word-oriented stream cipher, called SNOW, is proposed, consisting of a linear feedback shift register, feeding a nite state machine, and the fastest C implementation requires under 1 clock cycle per running key bit.
Scream: A Software-Efficient Stream Cipher
The design of Scream is reported, a new software-efficient stream cipher, which was designed to be a "more secure SEAL", and it is believed that it offers a significantly higher security level.
A Practical Attack on Broadcast RC4
A major statistical weakness in RC4 makes it trivial to distinguish between short outputs of RC4 and random strings by analyzing their second bytes, which can be used to mount a practical ciphertext-only attack on RC4 in some broadcast applications.
Guess-and-Determine Attacks on SNOW
This paper describes guess-and-determine attacks on the stream cipher SNOW with a data complexity of O(264) and a process complexity ofO(2256).
A Software-Optimized Encryption Algorithm
The software-efficient encryption algorithm SEAL 3.0 is described, which stretches a 32-bit position index into a long, pseudorandom string that can be used as the keystream of a Vernam cipher.
The Software-Oriented Stream Cipher SSC2
Theoretical analysis demonstrates that the keystream sequences generated by SSC2 have long period, large linear complexity, and good statistical distribution.
Analysis Methods for (Alleged) RC4
The analysis methods reveal intrinsic properties of alleged RC4 which are independent of the key scheduling and the key size, and the complexity of one of the attacks is estimated to be less than the time of searching through the square root of all possible initial states.
Cryptanalysis of Stream Ciphers with Linear Masking
This report describes a cryptanalytical technique for distinguishing some stream ciphers from a truly random process, and analyzes two specific "distinguishing properties", including a linear approximation of the non-linear process, which is demonstrated on the stream cipher SNOW.
The Design of Rijndael
This volume is the authoritative guide to the Rijndael algorithm and AES and professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.
Distinguishing Attacks on SOBER-t16 and t32
Two ways of mounting distinguishing attacks on two similar stream ciphers, SOBER-t16 and SOBER-t32, are proposed. It results in distinguishing attacks faster than exhaustive key search on full SOBER-