Theoretical Linear Cryptanalysis of the 5G Standard Candidate SNOW 5G
In this paper, we perform linear cryptanalysis of the stream cipher SNOW 5G, which is recommended by the international standardization group (SAGE) as one standard algorithm for 5G confidentiality and integrity protection over the wireless channel. SNOW 5G can be regarded as one member of the SNOW-V...
Saved in:
Published in | IACR Transactions on Symmetric Cryptology Vol. 2024; no. 2; pp. 141 - 165 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
Ruhr-Universität Bochum
18.06.2024
|
Subjects | |
Online Access | Get full text |
ISSN | 2519-173X 2519-173X |
DOI | 10.46586/tosc.v2024.i2.141-165 |
Cover
Loading…
Abstract | In this paper, we perform linear cryptanalysis of the stream cipher SNOW 5G, which is recommended by the international standardization group (SAGE) as one standard algorithm for 5G confidentiality and integrity protection over the wireless channel. SNOW 5G can be regarded as one member of the SNOW-V family, as it is modified from SNOW-Vi by SAGE with a slight improvement. As an overall contribution, we provide a comprehensive and elaborate theoretical analysis of linear approximations of SNOW 5G and provide the best public cryptanalysis result by far. Specifically, we first theoretically analyze the formats of linear masks of SNOW5G that can introduce high correlations, and then search for high-quality linear masks using a divide-and-conquer method based on the different cases of a critical intermediate linear mask. We find a linear approximation of SNOW 5G with correlation −2−67.67 and further launch a correlation attack against it with complexity 2279.8, improving the existing best correlation attack by a factor of 232.4. Our results are mainly from theoretical analysis, which involve little computation overhead and help to better understand the security of SNOW 5G. |
---|---|
AbstractList | In this paper, we perform linear cryptanalysis of the stream cipher SNOW 5G, which is recommended by the international standardization group (SAGE) as one standard algorithm for 5G confidentiality and integrity protection over the wireless channel. SNOW 5G can be regarded as one member of the SNOW-V family, as it is modified from SNOW-Vi by SAGE with a slight improvement. As an overall contribution, we provide a comprehensive and elaborate theoretical analysis of linear approximations of SNOW 5G and provide the best public cryptanalysis result by far. Specifically, we first theoretically analyze the formats of linear masks of SNOW5G that can introduce high correlations, and then search for high-quality linear masks using a divide-and-conquer method based on the different cases of a critical intermediate linear mask. We find a linear approximation of SNOW 5G with correlation −2−67.67 and further launch a correlation attack against it with complexity 2279.8, improving the existing best correlation attack by a factor of 232.4. Our results are mainly from theoretical analysis, which involve little computation overhead and help to better understand the security of SNOW 5G. |
Author | Liu, Yinuo Yang, Jing Tian, Tian |
Author_xml | – sequence: 1 givenname: Yinuo surname: Liu fullname: Liu, Yinuo – sequence: 2 givenname: Jing surname: Yang fullname: Yang, Jing – sequence: 3 givenname: Tian surname: Tian fullname: Tian, Tian |
BookMark | eNpNkF1LwzAUhoNMcM79BckfaM1320spcw6Gu9hE78JpkrqM2o6kCPv3xk3Eq_fwvvDAeW7RpB96h9A9JblQslQP4xBN_sUIE7lnORU0o0peoSmTtMpowd8n_-4bNI_xQAhhZcWVqKZosdu7IbjRG-jw2vcOAq7D6ThCD90p-oiHFo97h-USb1NpIVhcp_QWRoe3L5u3NN2h6xa66Oa_OUOvT4td_ZytN8tV_bjODKdqzMq2qWxBOW8lMyUviBWcCQJCyLICyRSxTWOlE0Y5sJY5AMIppTZN0nLLZ2h14doBDvoY_CeEkx7A63MxhA8NIf3SOW0bwohqVGmkEZxASSrHjKOFk0rZAhJLXVgmDDEG1_7xKNFnt_rHrT671Z7p5FYnt_wbXb1vLg |
ContentType | Journal Article |
DBID | AAYXX CITATION DOA |
DOI | 10.46586/tosc.v2024.i2.141-165 |
DatabaseName | CrossRef DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef |
DatabaseTitleList | CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
DeliveryMethod | fulltext_linktorsrc |
EISSN | 2519-173X |
EndPage | 165 |
ExternalDocumentID | oai_doaj_org_article_db0206b68c5c430a809e2ce17e566d7a 10_46586_tosc_v2024_i2_141_165 |
GroupedDBID | AAYXX ADBBV ALMA_UNASSIGNED_HOLDINGS BCNDV CITATION GROUPED_DOAJ |
ID | FETCH-LOGICAL-c316t-8fb9d7133f52c8370d43240a44589a5260dbbd5e4c6eadd2eaa03111d5265d3d3 |
IEDL.DBID | DOA |
ISSN | 2519-173X |
IngestDate | Wed Aug 27 01:25:25 EDT 2025 Tue Jul 01 03:41:35 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 2 |
Language | English |
License | http://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c316t-8fb9d7133f52c8370d43240a44589a5260dbbd5e4c6eadd2eaa03111d5265d3d3 |
OpenAccessLink | https://doaj.org/article/db0206b68c5c430a809e2ce17e566d7a |
PageCount | 25 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_db0206b68c5c430a809e2ce17e566d7a crossref_primary_10_46586_tosc_v2024_i2_141_165 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2024-06-18 |
PublicationDateYYYYMMDD | 2024-06-18 |
PublicationDate_xml | – month: 06 year: 2024 text: 2024-06-18 day: 18 |
PublicationDecade | 2020 |
PublicationTitle | IACR Transactions on Symmetric Cryptology |
PublicationYear | 2024 |
Publisher | Ruhr-Universität Bochum |
Publisher_xml | – name: Ruhr-Universität Bochum |
SSID | ssj0002893649 |
Score | 2.2738354 |
Snippet | In this paper, we perform linear cryptanalysis of the stream cipher SNOW 5G, which is recommended by the international standardization group (SAGE) as one... |
SourceID | doaj crossref |
SourceType | Open Website Index Database |
StartPage | 141 |
SubjectTerms | divide-and-conquer linear approximations linear cryptanalysis SNOW 5G |
Title | Theoretical Linear Cryptanalysis of the 5G Standard Candidate SNOW 5G |
URI | https://doaj.org/article/db0206b68c5c430a809e2ce17e566d7a |
Volume | 2024 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV09T8MwELVQJxYEAkT5kgdWt3FiO8kIVUvFUIa2opvlr0hlaKsSKvHvuXMClImFNYki5-6Sey--e0fIXVABxzcYVjphmeCmYta4nOWJT6zl2PoZC2QnajwXTwu52Bv1hTVhjTxwY7i-twBolFWFk05kiSmSMqQu8DwAEPF5hEaQ8_bI1GuzfZYpUTYtwQKyrOrX6zfX2wHXF71lCh8InI8sf2WjPdH-mF1Gx-SohYX0vlnOCTkIq1MynP10GVIgjRCUdLD92ACea5RE6LqiAOCofKTT9pcAHWCfCtJ4Op08v8CpMzIfDWeDMWvHHjCXcVWzorKlR-5YydShNo2PqnlGCFmURgIB8dZ6GYRTEAY-DcbAm8m5R6V7n_nsnHRW61W4INQ4YCw5bnZmBTahAkZ1WEsoTZV6FVyX9L8eX28adQsNrCAaTKPBdDSYXqZAEbgGg3XJA1rp-2pUp44HwGe69Zn-y2eX_3GTK3KIa8OyLV5ck069fQ83ABBqextj4RPrEbZ1 |
linkProvider | Directory of Open Access Journals |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Theoretical+Linear+Cryptanalysis+of+the+5G+Standard+Candidate+SNOW+5G&rft.jtitle=IACR+Transactions+on+Symmetric+Cryptology&rft.au=Liu%2C+Yinuo&rft.au=Yang%2C+Jing&rft.au=Tian%2C+Tian&rft.date=2024-06-18&rft.issn=2519-173X&rft.eissn=2519-173X&rft.volume=2024&rft.issue=2&rft.spage=141&rft.epage=165&rft_id=info:doi/10.46586%2Ftosc.v2024.i2.141-165&rft.externalDBID=n%2Fa&rft.externalDocID=10_46586_tosc_v2024_i2_141_165 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2519-173X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2519-173X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2519-173X&client=summon |