Best Known Fast Correlation Attack on SNOW 3G Based on a New Insight

IF 2.6 4区 计算机科学 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS
Xinhai Wang, Lin Ding, Jiang Wan, Zhengting Li, Zheng Wu
{"title":"Best Known Fast Correlation Attack on SNOW 3G Based on a New Insight","authors":"Xinhai Wang,&nbsp;Lin Ding,&nbsp;Jiang Wan,&nbsp;Zhengting Li,&nbsp;Zheng Wu","doi":"10.1049/ise2/7162579","DOIUrl":null,"url":null,"abstract":"<p>The well-known SNOW 3G stream cipher serves as the core of 3GPP confidentiality and integrity algorithms UEA 2 and UIA2 for universal mobile telecommunications system (UMTS) and long term evolution (LTE) networks. Recently, Gong and Zhang gave two linear approximations of SNOW 3G with correlation 2<sup>−20.48</sup>, and then proposed a fast correlation attack on the cipher with time/data/memory/precomputation complexities all upper bounded by 2<sup>174.16</sup>. In this paper, a more accurate calculation method of the linear approximation correlations is proposed. It treats the inversion function of the 32-bit Sbox used in SNOW 3G as the parallel composition of four 8-bit Sboxes, and the correlation calculation of the noise variables as the correlation calculation of the addition modulo 2<sup>32</sup> with two inputs. Based on this new insight, we improve the correlation of the best linear approximation of SNOW 3G from 2<sup>−20.48</sup> to 2<sup>−18.91</sup>. The new result is substituted into a new fast correlation attack on SNOW 3G, whose time/data/memory/precomputation complexities are all improved compared with the existing attacks. To the best of our knowledge, this is the best cryptanalytic result of SNOW 3G up to now.</p>","PeriodicalId":50380,"journal":{"name":"IET Information Security","volume":"2025 1","pages":""},"PeriodicalIF":2.6000,"publicationDate":"2025-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ietresearch.onlinelibrary.wiley.com/doi/epdf/10.1049/ise2/7162579","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Information Security","FirstCategoryId":"94","ListUrlMain":"https://ietresearch.onlinelibrary.wiley.com/doi/10.1049/ise2/7162579","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The well-known SNOW 3G stream cipher serves as the core of 3GPP confidentiality and integrity algorithms UEA 2 and UIA2 for universal mobile telecommunications system (UMTS) and long term evolution (LTE) networks. Recently, Gong and Zhang gave two linear approximations of SNOW 3G with correlation 2−20.48, and then proposed a fast correlation attack on the cipher with time/data/memory/precomputation complexities all upper bounded by 2174.16. In this paper, a more accurate calculation method of the linear approximation correlations is proposed. It treats the inversion function of the 32-bit Sbox used in SNOW 3G as the parallel composition of four 8-bit Sboxes, and the correlation calculation of the noise variables as the correlation calculation of the addition modulo 232 with two inputs. Based on this new insight, we improve the correlation of the best linear approximation of SNOW 3G from 2−20.48 to 2−18.91. The new result is substituted into a new fast correlation attack on SNOW 3G, whose time/data/memory/precomputation complexities are all improved compared with the existing attacks. To the best of our knowledge, this is the best cryptanalytic result of SNOW 3G up to now.

Abstract Image

基于新见解的SNOW 3G最知名快速相关攻击
众所周知的SNOW 3G流密码是通用移动通信系统(UMTS)和长期演进(LTE)网络的3GPP机密性和完整性算法UEA 2和UEA 2的核心。最近,Gong和Zhang给出了两个相关系数为2−20.48的snow3g的线性近似,然后对时间/数据/内存/预计算复杂度均上界为2174.16的密码提出了一种快速相关攻击。本文提出了一种更精确的线性近似相关的计算方法。将SNOW 3G中使用的32位Sbox的反演函数视为4个8位Sbox的并行组合,将噪声变量的相关计算视为双输入加模232的相关计算。基于这一新的见解,我们将SNOW 3G的最佳线性近似的相关性从2−20.48提高到2−18.91。将新结果替换为一种新的基于SNOW 3G的快速相关攻击,其时间/数据/内存/预计算复杂度与现有攻击相比均有提高。据我们所知,这是迄今为止SNOW 3G最好的密码分析结果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IET Information Security
IET Information Security 工程技术-计算机:理论方法
CiteScore
3.80
自引率
7.10%
发文量
47
审稿时长
8.6 months
期刊介绍: IET Information Security publishes original research papers in the following areas of information security and cryptography. Submitting authors should specify clearly in their covering statement the area into which their paper falls. Scope: Access Control and Database Security Ad-Hoc Network Aspects Anonymity and E-Voting Authentication Block Ciphers and Hash Functions Blockchain, Bitcoin (Technical aspects only) Broadcast Encryption and Traitor Tracing Combinatorial Aspects Covert Channels and Information Flow Critical Infrastructures Cryptanalysis Dependability Digital Rights Management Digital Signature Schemes Digital Steganography Economic Aspects of Information Security Elliptic Curve Cryptography and Number Theory Embedded Systems Aspects Embedded Systems Security and Forensics Financial Cryptography Firewall Security Formal Methods and Security Verification Human Aspects Information Warfare and Survivability Intrusion Detection Java and XML Security Key Distribution Key Management Malware Multi-Party Computation and Threshold Cryptography Peer-to-peer Security PKIs Public-Key and Hybrid Encryption Quantum Cryptography Risks of using Computers Robust Networks Secret Sharing Secure Electronic Commerce Software Obfuscation Stream Ciphers Trust Models Watermarking and Fingerprinting Special Issues. Current Call for Papers: Security on Mobile and IoT devices - https://digital-library.theiet.org/files/IET_IFS_SMID_CFP.pdf
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信