Abstract
SNOW 2.0 was developed by Johansson and Ekdahl in 2002, as a modified version of SNOW 1.0. In this paper we present the application of linear (masking) attack to SNOW 2.0 stream cipher. Our attack requires 2225 output words (2230 bits) and 2225 steps of analysis to distinguish the output of SNOW 2.0 from a truly random bit sequence.
Chapter PDF
Similar content being viewed by others
References
Coppersmith, D., Halevi, S., Jutla, C.: Scream: a software-efficient stream cipher. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 195–209. Springer, Heidelberg (2002)
Coppersmith, D., Halevi, S., Jutla, C.: Cryptanalysis of stream ciphers with linear masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 515–532. Springer, Heidelberg (2002)
Daemen, J., Clapp, C.: Fast Hashing and Stream Encryption with Panama. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 60–74. Springer, Heidelberg (1998)
Daemen, J., Rijmen, V.: AES Proposal: Rijndael. AES algorithm submission (September 3, 1999), available at http://www.nist.gov/aes/
Ekdahl, P., Johansson, T.: SNOW – a new stream cipher. NESSIE project submission (2000), available at http://www.cryptonessie.org
Ekdahl, P., Johansson, T.: Distinguishing attacks on SOBER-t16 and t32. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 210–224. Springer, Heidelberg (2002)
Ekdahl, P., Johansson, T.: A new version of the stream cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 47–61. Springer, Heidelberg (2003)
Golić, J.: Linear models for keystream generator. IEEE Trans. Computers C-45, 41–49 (1996)
Golić, J.: Linear statistical weakness of alleged RC4 keystream generator. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 226–238. Springer, Heidelberg (1997)
Hawkes, P., Rose, G.: Guess-and-Determine Attacks on SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 37–46. Springer, Heidelberg (2003)
Matsui, M.: Linear cryptanalysis method for DES cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 159–169. Springer, Heidelberg (1994)
Rogaway, P., Coppersmith, D.: A Software-Optimized Encryption Algorithm. In: Anderson, R. (ed.) FSE 1993. LNCS, vol. 809, pp. 56–63. Springer, Heidelberg (1994)
Rogaway, P., Coppersmith, D.: A Software-Optimized Encryption Algorithm. Journal of Cryptography 11(4), 273–287 (1998)
Rose, G.: A Stream Cipher based on Linear Feedback over GF 28. In: Proc. Australian Conference on Information Security and Privacy, Springer, Heidelberg (1998)
Rueppel, R.: Analysis and Design of Stream Ciphers. Springer, Heidelberg (1986)
Watanabe, D., Furuya, S., Yoshida, H., Preneel, B.: A new keystream generator MUGI. In: Daemen, J., Rijmen, V. (eds.) FSE 2002. LNCS, vol. 2365, pp. 179–194. Springer, Heidelberg (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Watanabe, D., Biryukov, A., De Cannière, C. (2004). A Distinguishing Attack of SNOW 2.0 with Linear Masking Method. In: Matsui, M., Zuccherato, R.J. (eds) Selected Areas in Cryptography. SAC 2003. Lecture Notes in Computer Science, vol 3006. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-24654-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-540-24654-1_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-21370-3
Online ISBN: 978-3-540-24654-1
eBook Packages: Springer Book Archive