
Differential attacks on reduced‐round SNOW 3G and SNOW 3G ⊕
Author(s) -
Ma Sudong,
Guan Jie
Publication year - 2020
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2019.0478
Subject(s) - snow , computer science , multiset , stream cipher , collision , differential (mechanical device) , time complexity , algorithm , computational complexity theory , cryptography , mathematics , computer security , meteorology , discrete mathematics , geography , engineering , aerospace engineering
The stream cipher SNOW 3G is the core of the 3G Partnership Project (3GPP) for implementing a confidentiality algorithm and data integrity algorithm. In this study, the authors analyse the initialisation stage based on the chosen IV differential attacks on the reduced‐round SNOW 3G and SNOW 3 G ⊕ . Firstly, they show a distinguisher for 12‐round SNOW 3G and 255 distinguishers for 13‐round SNOW 3 G ⊕ , respectively. Secondly, they use the input differences and the output differences of the S‐box to recover the input of S‐box, which can recover full keys in real‐time for 12‐round SNOW 3 G ⊕ . The data complexity is 36 and the time complexity is small. Finally, they use the impossible differences of the S‐box as a filter to extend the initialisation rounds of the attack to 16‐round SNOW 3 G ⊕ . The data complexity is 28 and the time complexity is O ( 2 115.75 ) . So far, the authors’ attack results are the best in terms of chosen IV differential attacks. At the same time, their attack results are superior to multiset collision attacks in terms of data complexity, and their attack method can recover full keys, while multiset collision attacks can only partially recover the internal states in 15‐round SNOW 3 G ⊕ .