2015
DOI: 10.1007/978-3-662-47989-6_31
|View full text |Cite
|
Sign up to set email alerts
|

Fast Correlation Attacks over Extension Fields, Large-Unit Linear Approximation and Cryptanalysis of SNOW 2.0

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

1
46
0
3

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 27 publications
(50 citation statements)
references
References 21 publications
1
46
0
3
Order By: Relevance
“…For SNOW 2.0, several distinguishing attacks and correlation attacks have been proposed [NW06,ZXM15]. The basic idea has been to approximate the FSM part through linear masking and then to cancel out the contributions of the registers by combining expressions for several keystream words.…”
Section: Linear Distinguishing Attacks and Correlation Attacksmentioning
confidence: 99%
“…For SNOW 2.0, several distinguishing attacks and correlation attacks have been proposed [NW06,ZXM15]. The basic idea has been to approximate the FSM part through linear masking and then to cancel out the contributions of the registers by combining expressions for several keystream words.…”
Section: Linear Distinguishing Attacks and Correlation Attacksmentioning
confidence: 99%
“…This new weakness leads to various severe attacks [13] on GOST. Similarly, our cryptographic sampling technique is applicable and it further threatens the security of the SNOW 2.0 cipher [22]. For general SNR ≥ 8 log 2, regardless of 2 L , when N ∼ 2 n , we choose appropriate b such that N = b · 2 .…”
Section: Applications and Experimental Resultsmentioning
confidence: 99%
“…Given that the confidentiality is a very crucial aspect in satellite communications, the encryption algorithms in the satellite phones should be strong enough to withstand various eavesdropping risks. In the mobile application scenario, several symmetric ciphers have been developed and adopted as cryptographic components for secure communications, e.g., A5, SNOW, and ZUC, and their security has been sufficiently evaluated in the past years [2][3][4][5][6][7][8]. However, the GMR cryptographic algorithms are not included in the officially published GMR standards, and the details of these satellite cipher algorithms were non-public until the German research team Driessen et al [9,10] uncovered the GMR-1 and the GMR-2 ciphers using reverse engineering in 2012.…”
Section: Backgrounds and The Gmr-2 Ciphermentioning
confidence: 99%