Advertisement

Guess-and-Determine Attacks on SNOW

  • Philip Hawkes
  • Gregory G. Rose
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2595)

Abstract

This paper describes guess-and-determine attacks on the stream cipher SNOW. The first attack has a data complexity of O(264) and a process complexity of O(2256). The second attack has process complexity of O(2224), and a data complexity of O(295).

References

  1. 1.
    S. Blackburn, S. Murphy, F. Piper, and P. Wild. A SOBERing remark. Technical report, Information Security Group, Royal Holloway University of London, Egham, Surrey TW20 0EX, U.K., 1998.Google Scholar
  2. 2.
    D. Bleichenbacher and S Patel. SOBER cryptanalysis. Fast Software Encryption, FSE’99 Lecture Notes in Computer Science, vol. 1636, L. Knudsen ed., Springer-Verlag, pages 305–316, 1999.CrossRefGoogle Scholar
  3. 3.
    P. Ekdahl and T. Johansson. SNOW-a new stream cipher, 2000. This paper is found in the NESSIE webpages: http://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions/snow.zip.
  4. 4.
    P. Hawkes and G. Rose. Exploiting multiples of the connection polynomial in wordoriented stream ciphers. Advances in Cryptology, ASIACRYPT2000, Lecture Notes in Computer Science, vol. 1976, T. Okamoto ed., Springer-Verlag, pages 302–316, 2000.Google Scholar
  5. 5.
    P. Hawkes and G. Rose. Primitive specification and supporting documentation for SOBER-t16 submission to NESSIE, 2000. See: http://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions/sober-t16.zip.
  6. 6.
    P. Hawkes and G. Rose. Primitive specification and supporting documentation for SOBER-t32 submission to NESSIE, 2000. See: http://www.cosic.esat.kuleuven.ac.be/nessie/workshop/submissions/sober-t32.zip.

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Philip Hawkes
    • 1
  • Gregory G. Rose
    • 1
  1. 1.Qualcomm Australia, Level 3GladesvilleAustralia

Personalised recommendations