{"title":"SNOW系列流密码xor版本抗快速相关攻击的可证明安全性评估","authors":"Sudong Ma;Chenhui Jin;Xinxin Gong;Senpeng Wang;Ting Cui;Lin Ding;Jie Guan","doi":"10.1109/TIT.2025.3565463","DOIUrl":null,"url":null,"abstract":"Fast correlation attack is one of the most powerful attack methods for LFSR-based stream ciphers, and the primary problem of the attack is to construct the linear approximations with great absolute correlations. For some stream ciphers with complex structures of linear approximations, the search for the maximum absolute correlation of linear approximations has always been a difficult problem because of the extremely high amount of masks that need to be searched. In this paper, an analysis method for searching maximum absolute correlation based on the linear mask structure is developed, including the filtering technology based on mask propagation trail, a structural characteristic of linear approximations of linear transformations with fewer active bytes, and linear approximation equivalence theorem of composite function composed of the parallel identical S-boxes and linear transformation. These methods efficiently reduce the exhaustive time complexity of the masks. As applications, this paper proves that the suprema of absolute correlations of all the linear approximations for the five XOR-versions of SNOW family stream ciphers (i.e., SNOW <inline-formula> <tex-math>$2.0_{\\oplus }$ </tex-math></inline-formula>, SNOW <inline-formula> <tex-math>$\\text{3G}_{\\oplus }$ </tex-math></inline-formula>, SNOW-<inline-formula> <tex-math>$\\text{V}_{\\oplus }$ </tex-math></inline-formula>, SNOW-<inline-formula> <tex-math>$\\text{Vi}_{\\oplus }$ </tex-math></inline-formula>, SNOW <inline-formula> <tex-math>$\\text{5G}_{\\oplus }$ </tex-math></inline-formula>) are <inline-formula> <tex-math>${2^{ - 9}}/{2^{ - 15.893}}/{2^{ - 37.964}}/{2^{ - 37.964}}/{2^{ - 37.964}}$ </tex-math></inline-formula>. The exhaustive time complexity of the masks can be reduced from <inline-formula> <tex-math>$O({2^{32}})/O({2^{96}})/O({2^{384}})/O({2^{384}})/O({2^{384}})$ </tex-math></inline-formula> to <inline-formula> <tex-math>$O({2^{24}})/O({2^{31.98}})/O({2^{39.98}})/O({2^{39.98}})/~O({2^{39.98}})$ </tex-math></inline-formula>, respectively. Furthermore, we give the provable security evaluations of the five ciphers against fast correlation attacks under the success probability of 0.99 for the known fast correlation attack method. For SNOW-<inline-formula> <tex-math>$\\text{V}_{\\oplus }$ </tex-math></inline-formula>/SNOW-<inline-formula> <tex-math>$\\text{Vi}_{\\oplus }$ </tex-math></inline-formula>/SNOW <inline-formula> <tex-math>$\\text{5G}_{\\oplus }$ </tex-math></inline-formula>, the time/data/memory complexity of the optimal fast correlation attacks are all <inline-formula> <tex-math>$O(2^{227.54})/O(2^{227.72})/O(2^{227.72})$ </tex-math></inline-formula>. The results show that SNOW-<inline-formula> <tex-math>$\\text{V}_{\\oplus }$ </tex-math></inline-formula>/SNOW-<inline-formula> <tex-math>$\\text{Vi}_{\\oplus }$ </tex-math></inline-formula>/SNOW <inline-formula> <tex-math>$\\text{5G}_{\\oplus }$ </tex-math></inline-formula> cannot guarantee the claimed 256-bit key security for the known fast correlation attack methods if we ignore the design constraint that the maximum length of keystream for a single pair of key and IV is <inline-formula> <tex-math>$2^{64}$ </tex-math></inline-formula>. For SNOW <inline-formula> <tex-math>$2.0_{\\oplus }$ </tex-math></inline-formula> and SNOW <inline-formula> <tex-math>$\\text{3G}_{\\oplus }$ </tex-math></inline-formula>, the time/data/memory complexity of the optimal fast correlation attacks are <inline-formula> <tex-math>$O({2^{151.94}})/O({2^{151.35}})/O({2^{151.35}})$ </tex-math></inline-formula> and <inline-formula> <tex-math>$O(2^{165.91})/O(2^{165.43})/O(2^{165.43})$ </tex-math></inline-formula>, respectively. The results show that both SNOW <inline-formula> <tex-math>$2.0_{\\oplus }$ </tex-math></inline-formula> and SNOW <inline-formula> <tex-math>$\\text{3G}_{\\oplus }$ </tex-math></inline-formula> can guarantee the claimed 128-bit key security for the known fast correlation attack methods. In addition, this paper also discusses that the existing fast correlation attacks based on multiple linear approximations are invalid for these five ciphers.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 6","pages":"4035-4054"},"PeriodicalIF":2.2000,"publicationDate":"2025-04-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Provable Security Evaluations of XOR-Versions of SNOW Family Stream Ciphers Against Fast Correlation Attacks\",\"authors\":\"Sudong Ma;Chenhui Jin;Xinxin Gong;Senpeng Wang;Ting Cui;Lin Ding;Jie Guan\",\"doi\":\"10.1109/TIT.2025.3565463\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Fast correlation attack is one of the most powerful attack methods for LFSR-based stream ciphers, and the primary problem of the attack is to construct the linear approximations with great absolute correlations. For some stream ciphers with complex structures of linear approximations, the search for the maximum absolute correlation of linear approximations has always been a difficult problem because of the extremely high amount of masks that need to be searched. In this paper, an analysis method for searching maximum absolute correlation based on the linear mask structure is developed, including the filtering technology based on mask propagation trail, a structural characteristic of linear approximations of linear transformations with fewer active bytes, and linear approximation equivalence theorem of composite function composed of the parallel identical S-boxes and linear transformation. These methods efficiently reduce the exhaustive time complexity of the masks. As applications, this paper proves that the suprema of absolute correlations of all the linear approximations for the five XOR-versions of SNOW family stream ciphers (i.e., SNOW <inline-formula> <tex-math>$2.0_{\\\\oplus }$ </tex-math></inline-formula>, SNOW <inline-formula> <tex-math>$\\\\text{3G}_{\\\\oplus }$ </tex-math></inline-formula>, SNOW-<inline-formula> <tex-math>$\\\\text{V}_{\\\\oplus }$ </tex-math></inline-formula>, SNOW-<inline-formula> <tex-math>$\\\\text{Vi}_{\\\\oplus }$ </tex-math></inline-formula>, SNOW <inline-formula> <tex-math>$\\\\text{5G}_{\\\\oplus }$ </tex-math></inline-formula>) are <inline-formula> <tex-math>${2^{ - 9}}/{2^{ - 15.893}}/{2^{ - 37.964}}/{2^{ - 37.964}}/{2^{ - 37.964}}$ </tex-math></inline-formula>. The exhaustive time complexity of the masks can be reduced from <inline-formula> <tex-math>$O({2^{32}})/O({2^{96}})/O({2^{384}})/O({2^{384}})/O({2^{384}})$ </tex-math></inline-formula> to <inline-formula> <tex-math>$O({2^{24}})/O({2^{31.98}})/O({2^{39.98}})/O({2^{39.98}})/~O({2^{39.98}})$ </tex-math></inline-formula>, respectively. Furthermore, we give the provable security evaluations of the five ciphers against fast correlation attacks under the success probability of 0.99 for the known fast correlation attack method. For SNOW-<inline-formula> <tex-math>$\\\\text{V}_{\\\\oplus }$ </tex-math></inline-formula>/SNOW-<inline-formula> <tex-math>$\\\\text{Vi}_{\\\\oplus }$ </tex-math></inline-formula>/SNOW <inline-formula> <tex-math>$\\\\text{5G}_{\\\\oplus }$ </tex-math></inline-formula>, the time/data/memory complexity of the optimal fast correlation attacks are all <inline-formula> <tex-math>$O(2^{227.54})/O(2^{227.72})/O(2^{227.72})$ </tex-math></inline-formula>. The results show that SNOW-<inline-formula> <tex-math>$\\\\text{V}_{\\\\oplus }$ </tex-math></inline-formula>/SNOW-<inline-formula> <tex-math>$\\\\text{Vi}_{\\\\oplus }$ </tex-math></inline-formula>/SNOW <inline-formula> <tex-math>$\\\\text{5G}_{\\\\oplus }$ </tex-math></inline-formula> cannot guarantee the claimed 256-bit key security for the known fast correlation attack methods if we ignore the design constraint that the maximum length of keystream for a single pair of key and IV is <inline-formula> <tex-math>$2^{64}$ </tex-math></inline-formula>. For SNOW <inline-formula> <tex-math>$2.0_{\\\\oplus }$ </tex-math></inline-formula> and SNOW <inline-formula> <tex-math>$\\\\text{3G}_{\\\\oplus }$ </tex-math></inline-formula>, the time/data/memory complexity of the optimal fast correlation attacks are <inline-formula> <tex-math>$O({2^{151.94}})/O({2^{151.35}})/O({2^{151.35}})$ </tex-math></inline-formula> and <inline-formula> <tex-math>$O(2^{165.91})/O(2^{165.43})/O(2^{165.43})$ </tex-math></inline-formula>, respectively. The results show that both SNOW <inline-formula> <tex-math>$2.0_{\\\\oplus }$ </tex-math></inline-formula> and SNOW <inline-formula> <tex-math>$\\\\text{3G}_{\\\\oplus }$ </tex-math></inline-formula> can guarantee the claimed 128-bit key security for the known fast correlation attack methods. In addition, this paper also discusses that the existing fast correlation attacks based on multiple linear approximations are invalid for these five ciphers.\",\"PeriodicalId\":13494,\"journal\":{\"name\":\"IEEE Transactions on Information Theory\",\"volume\":\"71 6\",\"pages\":\"4035-4054\"},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2025-04-29\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Information Theory\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10980226/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Information Theory","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10980226/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Provable Security Evaluations of XOR-Versions of SNOW Family Stream Ciphers Against Fast Correlation Attacks
Fast correlation attack is one of the most powerful attack methods for LFSR-based stream ciphers, and the primary problem of the attack is to construct the linear approximations with great absolute correlations. For some stream ciphers with complex structures of linear approximations, the search for the maximum absolute correlation of linear approximations has always been a difficult problem because of the extremely high amount of masks that need to be searched. In this paper, an analysis method for searching maximum absolute correlation based on the linear mask structure is developed, including the filtering technology based on mask propagation trail, a structural characteristic of linear approximations of linear transformations with fewer active bytes, and linear approximation equivalence theorem of composite function composed of the parallel identical S-boxes and linear transformation. These methods efficiently reduce the exhaustive time complexity of the masks. As applications, this paper proves that the suprema of absolute correlations of all the linear approximations for the five XOR-versions of SNOW family stream ciphers (i.e., SNOW $2.0_{\oplus }$ , SNOW $\text{3G}_{\oplus }$ , SNOW-$\text{V}_{\oplus }$ , SNOW-$\text{Vi}_{\oplus }$ , SNOW $\text{5G}_{\oplus }$ ) are ${2^{ - 9}}/{2^{ - 15.893}}/{2^{ - 37.964}}/{2^{ - 37.964}}/{2^{ - 37.964}}$ . The exhaustive time complexity of the masks can be reduced from $O({2^{32}})/O({2^{96}})/O({2^{384}})/O({2^{384}})/O({2^{384}})$ to $O({2^{24}})/O({2^{31.98}})/O({2^{39.98}})/O({2^{39.98}})/~O({2^{39.98}})$ , respectively. Furthermore, we give the provable security evaluations of the five ciphers against fast correlation attacks under the success probability of 0.99 for the known fast correlation attack method. For SNOW-$\text{V}_{\oplus }$ /SNOW-$\text{Vi}_{\oplus }$ /SNOW $\text{5G}_{\oplus }$ , the time/data/memory complexity of the optimal fast correlation attacks are all $O(2^{227.54})/O(2^{227.72})/O(2^{227.72})$ . The results show that SNOW-$\text{V}_{\oplus }$ /SNOW-$\text{Vi}_{\oplus }$ /SNOW $\text{5G}_{\oplus }$ cannot guarantee the claimed 256-bit key security for the known fast correlation attack methods if we ignore the design constraint that the maximum length of keystream for a single pair of key and IV is $2^{64}$ . For SNOW $2.0_{\oplus }$ and SNOW $\text{3G}_{\oplus }$ , the time/data/memory complexity of the optimal fast correlation attacks are $O({2^{151.94}})/O({2^{151.35}})/O({2^{151.35}})$ and $O(2^{165.91})/O(2^{165.43})/O(2^{165.43})$ , respectively. The results show that both SNOW $2.0_{\oplus }$ and SNOW $\text{3G}_{\oplus }$ can guarantee the claimed 128-bit key security for the known fast correlation attack methods. In addition, this paper also discusses that the existing fast correlation attacks based on multiple linear approximations are invalid for these five ciphers.
期刊介绍:
The IEEE Transactions on Information Theory is a journal that publishes theoretical and experimental papers concerned with the transmission, processing, and utilization of information. The boundaries of acceptable subject matter are intentionally not sharply delimited. Rather, it is hoped that as the focus of research activity changes, a flexible policy will permit this Transactions to follow suit. Current appropriate topics are best reflected by recent Tables of Contents; they are summarized in the titles of editorial areas that appear on the inside front cover.