Skip to main content

The Initialization Stage Analysis of ZUC v1.5

  • Conference paper
Book cover Cryptology and Network Security (CANS 2011)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7092))

Included in the following conference series:

Abstract

The ZUC algorithm is a new stream cipher, which is the core of the standardised 3GPP confidentiality and integrity algorithms 128-EEA3 & 128-EIA3. In this paper, we analyze the initialization stage of ZUC v1.5. First of all, we study the differential properties of operations in ZUC v1.5, including the bit-reorganization, exclusive-or and addition modulo 2n, bit shift and the update of LFSR. And then we give a differential trail covering 24 rounds of the initialization stage of ZUC v1.5 with probability 2− 23.48, which extends the differential given in the design and evaluation report of ZUC v1.5 to four more rounds. Nevertheless, the study shows that the stream cipher ZUC v1.5 can still resist against chosen-IV attacks.

This work was supported by the National Natural Science Foundation of China (Grant No. 60970152, 60833008 and 60902024), the National 973 Program of China (Grant No. 2011CB302400 and 2007CB807902) and Grand Project of Institute of Software (Grant No. YOCX285056).

This work had been presented informally at the Second International Workshop on ZUC Algorithm and Related Topics without proceedings.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ETSI/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, Document 2: ZUC Specification, Version 1.5 (January 4, 2011), http://gsmworld.com/documents/EEA3_EIA3_ZUC_v1_5.pdf

  2. ETSI/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, Document 1: 128-EEA3 and 128-EIA3 Specification, Version 1.5 (January 4, 2011), http://gsmworld.com/documents/EEA3_EIA3_specification_v1_5.pdf

  3. ETSI/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3, Document 4: Design and Evaluation Report, Version 1.3 (January 18, 2011), http://gsmworld.com/documents/EEA3_EIA3_Design_Evaluation_v1_3.pdf

  4. Englund, H., Johansson, T., Sönmez Turan, M.: A Framework for Chosen IV Statistical Analysis of Stream Ciphers. In: Srinathan, K., Rangan, C.P., Yung, M. (eds.) INDOCRYPT 2007. LNCS, vol. 4859, pp. 268–281. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  5. Fischer, S., Khazaei, S., Meier, W.: Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 236–245. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  6. Biham, E., Shamir, A.: Differential Cryptanalysis of DES-like Cryptosystems. In: Menezes, A., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2–21. Springer, Heidelberg (1991)

    Google Scholar 

  7. Li, J.: Improved Differential Paths on ZUC. Appear in the First International Workshop on ZUC Algorithm (December 2010)

    Google Scholar 

  8. Li, J.: Differential analysis of ZUC. Appear in the Second International Workshop on ZUC Algorithm and Related Topics (June 2011)

    Google Scholar 

  9. Sun, B., Tang, X., Li, C.: Preliminary Cryptanalysis Results of ZUC. Appear in the First International Workshop on ZUC Algorithm (December 2010)

    Google Scholar 

  10. Wu, H.: Cryptanalysis of the Stream Cipher ZUC in the 3GPP Confidentiality & Integrity Algorithms 128-EEA3 & 128-EIA3. Appear at the sump session in ASIACRYPT (2010)

    Google Scholar 

  11. Mouha, N., Velichkov, V., De Cannière, C., Preneel, B.: The Differential Analysis of S-Functions. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 36–56. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  12. Velichkov, V., Mouha, N., De Cannière, C., Preneel, B.: The Additive Differential Probability of ARX. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 342–358. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Zhou, C., Feng, X., Lin, D. (2011). The Initialization Stage Analysis of ZUC v1.5. In: Lin, D., Tsudik, G., Wang, X. (eds) Cryptology and Network Security. CANS 2011. Lecture Notes in Computer Science, vol 7092. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-25513-7_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-25513-7_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-25512-0

  • Online ISBN: 978-3-642-25513-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics