On the sliding property of SNOW 3 G and SNOW 2.0

@article{Kircanski2011OnTS,
  title={On the sliding property of SNOW 3 G and SNOW 2.0},
  author={Aleksandar Kircanski and A. Youssef},
  journal={IET Inf. Secur.},
  year={2011},
  volume={5},
  pages={199-206}
}
  • Aleksandar Kircanski, A. Youssef
  • Published 2011
  • Computer Science
  • IET Inf. Secur.
  • SNOW 3G is a stream cipher chosen by the 3rd Generation Partnership Project (3GPP) as a crypto-primitive to substitute KASUMI in case its security is compromised. [...] Key Result In addition to allowing related-key recovery attacks against SNOW 2.0 with 256-bit keys, the presented properties reveal non-random behaviour that yields related-key distinguishers and also questions the validity of the security proofs of protocols that are based on the assumption that SNOW 3G and SNOW 2.0 behave like perfect random…Expand Abstract
    23 Citations

    Figures, Tables, and Topics from this paper.

    Differential attacks on reduced-round SNOW 3G and SNOW 3G⊕
    Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG
    • 5
    • PDF
    A new SNOW stream cipher called SNOW-V
    • 6
    • PDF
    Combined and Robust SNOW-ZUC Algorithm Based on Chaotic System
    • Mahdi Madani, C. Tanougast
    • Computer Science
    • 2018 International Conference on Cyber Security and Protection of Digital Services (Cyber Security)
    • 2018
    • 3
    A real-time inversion attack on the GMR-2 cipher used in the satellite phones
    • 1
    • PDF
    Bitstream Modification Attack on SNOW 3G
    • Michail Moraitis, E. Dubrova
    • Environmental Science, Computer Science
    • 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE)
    • 2020
    • 2
    • PDF
    Cryptanalysis of MICKEY family of stream ciphers
    • 8
    Cryptanalysis of the Loiss Stream Cipher
    • 2
    • PDF
    Approved algorithmic security enhancement of stream cipher for advanced mobile communications

    References

    SHOWING 1-10 OF 25 REFERENCES
    A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony
    • 68
    • PDF
    A Related-Key Rectangle Attack on the Full KASUMI
    • 104
    • Highly Influential
    • PDF
    Slid Pairs in Salsa20 and Trivium
    • 33
    • Highly Influential
    • PDF
    Resynchronization Attacks on WG and LEX
    • 46
    • PDF
    Distinguisher and Related-Key Attack on the Full AES-256
    • 324
    • PDF
    A New Version of the Stream Cipher SNOW
    • 271
    • PDF
    New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
    • 37
    • PDF
    A New Keystream Generator MUGI
    • 79
    • Highly Influential
    • PDF