Theoretical Linear Cryptanalysis of the 5G Standard Candidate SNOW 5G

In this paper, we perform linear cryptanalysis of the stream cipher SNOW 5G, which is recommended by the international standardization group (SAGE) as one standard algorithm for 5G confidentiality and integrity protection over the wireless channel. SNOW 5G can be regarded as one member of the SNOW-V...

Full description

Saved in:
Bibliographic Details
Published inIACR Transactions on Symmetric Cryptology Vol. 2024; no. 2; pp. 141 - 165
Main Authors Liu, Yinuo, Yang, Jing, Tian, Tian
Format Journal Article
LanguageEnglish
Published Ruhr-Universität Bochum 18.06.2024
Subjects
Online AccessGet full text
ISSN2519-173X
2519-173X
DOI10.46586/tosc.v2024.i2.141-165

Cover

Loading…
Abstract In this paper, we perform linear cryptanalysis of the stream cipher SNOW 5G, which is recommended by the international standardization group (SAGE) as one standard algorithm for 5G confidentiality and integrity protection over the wireless channel. SNOW 5G can be regarded as one member of the SNOW-V family, as it is modified from SNOW-Vi by SAGE with a slight improvement. As an overall contribution, we provide a comprehensive and elaborate theoretical analysis of linear approximations of SNOW 5G and provide the best public cryptanalysis result by far. Specifically, we first theoretically analyze the formats of linear masks of SNOW5G that can introduce high correlations, and then search for high-quality linear masks using a divide-and-conquer method based on the different cases of a critical intermediate linear mask. We find a linear approximation of SNOW 5G with correlation −2−67.67 and further launch a correlation attack against it with complexity 2279.8, improving the existing best correlation attack by a factor of 232.4. Our results are mainly from theoretical analysis, which involve little computation overhead and help to better understand the security of SNOW 5G.
AbstractList In this paper, we perform linear cryptanalysis of the stream cipher SNOW 5G, which is recommended by the international standardization group (SAGE) as one standard algorithm for 5G confidentiality and integrity protection over the wireless channel. SNOW 5G can be regarded as one member of the SNOW-V family, as it is modified from SNOW-Vi by SAGE with a slight improvement. As an overall contribution, we provide a comprehensive and elaborate theoretical analysis of linear approximations of SNOW 5G and provide the best public cryptanalysis result by far. Specifically, we first theoretically analyze the formats of linear masks of SNOW5G that can introduce high correlations, and then search for high-quality linear masks using a divide-and-conquer method based on the different cases of a critical intermediate linear mask. We find a linear approximation of SNOW 5G with correlation −2−67.67 and further launch a correlation attack against it with complexity 2279.8, improving the existing best correlation attack by a factor of 232.4. Our results are mainly from theoretical analysis, which involve little computation overhead and help to better understand the security of SNOW 5G.
Author Liu, Yinuo
Yang, Jing
Tian, Tian
Author_xml – sequence: 1
  givenname: Yinuo
  surname: Liu
  fullname: Liu, Yinuo
– sequence: 2
  givenname: Jing
  surname: Yang
  fullname: Yang, Jing
– sequence: 3
  givenname: Tian
  surname: Tian
  fullname: Tian, Tian
BookMark eNpNkF1LwzAUhoNMcM79BckfaM1320spcw6Gu9hE78JpkrqM2o6kCPv3xk3Eq_fwvvDAeW7RpB96h9A9JblQslQP4xBN_sUIE7lnORU0o0peoSmTtMpowd8n_-4bNI_xQAhhZcWVqKZosdu7IbjRG-jw2vcOAq7D6ThCD90p-oiHFo97h-USb1NpIVhcp_QWRoe3L5u3NN2h6xa66Oa_OUOvT4td_ZytN8tV_bjODKdqzMq2qWxBOW8lMyUviBWcCQJCyLICyRSxTWOlE0Y5sJY5AMIppTZN0nLLZ2h14doBDvoY_CeEkx7A63MxhA8NIf3SOW0bwohqVGmkEZxASSrHjKOFk0rZAhJLXVgmDDEG1_7xKNFnt_rHrT671Z7p5FYnt_wbXb1vLg
ContentType Journal Article
DBID AAYXX
CITATION
DOA
DOI 10.46586/tosc.v2024.i2.141-165
DatabaseName CrossRef
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
DatabaseTitleList
CrossRef
Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
DeliveryMethod fulltext_linktorsrc
EISSN 2519-173X
EndPage 165
ExternalDocumentID oai_doaj_org_article_db0206b68c5c430a809e2ce17e566d7a
10_46586_tosc_v2024_i2_141_165
GroupedDBID AAYXX
ADBBV
ALMA_UNASSIGNED_HOLDINGS
BCNDV
CITATION
GROUPED_DOAJ
ID FETCH-LOGICAL-c316t-8fb9d7133f52c8370d43240a44589a5260dbbd5e4c6eadd2eaa03111d5265d3d3
IEDL.DBID DOA
ISSN 2519-173X
IngestDate Wed Aug 27 01:25:25 EDT 2025
Tue Jul 01 03:41:35 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 2
Language English
License http://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c316t-8fb9d7133f52c8370d43240a44589a5260dbbd5e4c6eadd2eaa03111d5265d3d3
OpenAccessLink https://doaj.org/article/db0206b68c5c430a809e2ce17e566d7a
PageCount 25
ParticipantIDs doaj_primary_oai_doaj_org_article_db0206b68c5c430a809e2ce17e566d7a
crossref_primary_10_46586_tosc_v2024_i2_141_165
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2024-06-18
PublicationDateYYYYMMDD 2024-06-18
PublicationDate_xml – month: 06
  year: 2024
  text: 2024-06-18
  day: 18
PublicationDecade 2020
PublicationTitle IACR Transactions on Symmetric Cryptology
PublicationYear 2024
Publisher Ruhr-Universität Bochum
Publisher_xml – name: Ruhr-Universität Bochum
SSID ssj0002893649
Score 2.2738354
Snippet In this paper, we perform linear cryptanalysis of the stream cipher SNOW 5G, which is recommended by the international standardization group (SAGE) as one...
SourceID doaj
crossref
SourceType Open Website
Index Database
StartPage 141
SubjectTerms divide-and-conquer
linear approximations
linear cryptanalysis
SNOW 5G
Title Theoretical Linear Cryptanalysis of the 5G Standard Candidate SNOW 5G
URI https://doaj.org/article/db0206b68c5c430a809e2ce17e566d7a
Volume 2024
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQJxYEAkT5kgdWt3FiO8kIVUvFUIa2opvlr0hlaKsSKvHvuXMClImFNYki5-6Sey--e0fIXVABxzcYVjphmeCmYta4nOWJT6zl2PoZC2QnajwXTwu52Bv1hTVhjTxwY7i-twBolFWFk05kiSmSMqQu8DwAEPF5hEaQ8_bI1GuzfZYpUTYtwQKyrOrX6zfX2wHXF71lCh8InI8sf2WjPdH-mF1Gx-SohYX0vlnOCTkIq1MynP10GVIgjRCUdLD92ACea5RE6LqiAOCofKTT9pcAHWCfCtJ4Op08v8CpMzIfDWeDMWvHHjCXcVWzorKlR-5YydShNo2PqnlGCFmURgIB8dZ6GYRTEAY-DcbAm8m5R6V7n_nsnHRW61W4INQ4YCw5bnZmBTahAkZ1WEsoTZV6FVyX9L8eX28adQsNrCAaTKPBdDSYXqZAEbgGg3XJA1rp-2pUp44HwGe69Zn-y2eX_3GTK3KIa8OyLV5ck069fQ83ABBqextj4RPrEbZ1
linkProvider Directory of Open Access Journals
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Theoretical+Linear+Cryptanalysis+of+the+5G+Standard+Candidate+SNOW+5G&rft.jtitle=IACR+Transactions+on+Symmetric+Cryptology&rft.au=Liu%2C+Yinuo&rft.au=Yang%2C+Jing&rft.au=Tian%2C+Tian&rft.date=2024-06-18&rft.issn=2519-173X&rft.eissn=2519-173X&rft.volume=2024&rft.issue=2&rft.spage=141&rft.epage=165&rft_id=info:doi/10.46586%2Ftosc.v2024.i2.141-165&rft.externalDBID=n%2Fa&rft.externalDocID=10_46586_tosc_v2024_i2_141_165
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2519-173X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2519-173X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2519-173X&client=summon