Advertisement

A New Version of the Stream Cipher SNOW

  • Patrik Ekdahl
  • Thomas Johansson
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2595)

Abstract

In 2000, the stream cipher SNOW was proposed. A few attacks followed, indicating certain weaknesses in the design. In this paper we propose a new version of SNOW, called SNOW 2.0. The new version of the cipher does not only appear to be more secure, but its implementation is also a bit faster in software.

Keywords

SNOW Stream ciphers summation combiner correlation attacks 

References

  1. 1.
    D. Coppersmith, S. Halevi, C. Jutla, “Cryptanalysis of stream ciphers with linear masking”, To appear in Advances in Cryptology-CRYPTO 2002, Lecture Notes in Computer Science, Springer, 2002.Google Scholar
  2. 2.
    D. Coppersmith, S. Halevi, C. Jutla, “Scream: a software-efficient stream cipher”, In Fast Software Encryption (FSE) 2002, Lecture Notes in Computer Science, vol. 2365, Springer 2002, 195–209.zbMATHGoogle Scholar
  3. 3.
    D. Coppersmith, P. Rogaway, “Software-efficient pseudorandom function and the use thereof for encryption”, US Patent 5,454,039, 1995.Google Scholar
  4. 4.
    J. Daemen, V. Rijmen, “The design of Rijndael”, Springer Verlag Series on Information Security and Cryptography, Springer Verlag, 2002, ISBN 3-540-42580-2.Google Scholar
  5. 5.
    P. Ekdahl, T. Johansson, “SNOW-a new stream cipher”, Proceedings of first NESSIE Workshop, Heverlee, Belgium, 2000.Google Scholar
  6. 6.
    P. Ekdahl, T. Johansson, “Distinguishing attacks on SOBER”, In Fast Software Encryption (FSE) 2002, Lecture Notes in Computer Science, vol. 2365, Springer 2002, 210–224.CrossRefGoogle Scholar
  7. 7.
    P. Hawkes, “Guess-and-determine attacks on SNOW”, private correspondence, 2002.Google Scholar
  8. 8.
    P. Hawkes, G. Rose, “Guess-and-determine attacks on SNOW”, Preproceedings of Selected Areas in Cryptography (SAC), August 2002, St John’s, Newfoundland, Canada.Google Scholar
  9. 9.
    P. Hawkes, G. Rose “Primitive Specification and supportion documentation for SOBER-t16 submission to NESSIE”, Proceedings of first NESSIE Workshop, Heverlee, Belgium, 2000.Google Scholar
  10. 10.
    P. Hawkes, G. Rose “Primitive Specification and supportion documentation for SOBER-t32 submission to NESSIE”, Proceedings of first NESSIE Workshop, Heverlee, Belgium, 2000.Google Scholar
  11. 11.
    L. Knudsen, W. Meier, B. Preneel, V. Rijmen, S. Verdoolaege, “Analysis methods for (alleged) RC4”, Lecture Notes in Computer Science, vol. 1514, pp. 327–341., (Asiacrypt’98).zbMATHGoogle Scholar
  12. 12.
    I. Mantin, A. Shamir, “A practical attack on RC4”, In Fast Software Encryption (FSE) 2001, Lecture Notes in Computer SCience, vol. 2355, Springer 2002.Google Scholar
  13. 13.
    A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.Google Scholar
  14. 14.
    R. Rivest, “The RC4 encryption algorithm”, RSA Data Security, Inc. Mar. 1992.Google Scholar
  15. 15.
    P. Rogaway, D. Coppersmith, “A software optimized encryption algorithm”. Journal of Cryptology, 11(4):273–287, 1998.CrossRefGoogle Scholar
  16. 16.
    D. Watanabe, S. Furuya, H. Yoshida, B. Preneel, “A new keystream generator MUGI”, In Fast Software Encryption (FSE) 2002, Lecture Notes in Computer Science, vol. 2365, Springer 2002, 179–194.CrossRefGoogle Scholar
  17. 17.
    M. Zhang, C. Caroll, A. Chan, “The software-oriented stream cipher SSC2”, In Fast Software Encryption (FSE) 2000, Lecture Notes in Computer Science, vol. 1978, Springer 2001, 31–48.CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Patrik Ekdahl
    • 1
  • Thomas Johansson
    • 1
  1. 1.Dept. of Information TechnologyLund UniversityLundSweden

Personalised recommendations