Analysis and Implementation of the SNOW 3G Generator Used in 4G/LTE Systems

  • J. Molina-Gil
  • P. Caballero-Gil
  • C. Caballero-Gil
  • Amparo Fúster-Sabater
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 239)


The fourth generation of cell phones, marketed as 4G/LTE (Long-Term Evolution) is being quickly adopted worldwide. Given the mobile and wireless nature of the involved communications, security is crucial. This paper includes both a theoretical study and a practical analysis of the SNOW 3G generator, included in such a standard for protecting confidentiality and integrity. From its implementation and performance evaluation in mobile devices, several conclusions about how to improve its efficiency are obtained.


4G/LTE encryption stream cipher SNOW 3G 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    ETSI/SAGE. Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 2: SNOW 3G Specification, version 1.1 (September 2006),
  2. 2.
    Ekdahl, P., Johansson, T.: SNOW - a new stream cipher. In: Proceedings of NESSIE Workshop (2000)Google Scholar
  3. 3.
    Ekdahl, P., Johansson, T.: A New Version of the Stream Cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 47–61. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Hawkes, P., Rose, G.G.: Guess-and-determine attacks on SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 37–46. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  5. 5.
    Coppersmith, D., Halevi, S., Jutla, C.S.: Cryptanalysis of stream ciphers with linear masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 515–532. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  6. 6.
    ISO/IEC 18033-4:2005. Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers,
  7. 7.
    Berbain, C., Billet, O., Canteaut, A., Courtois, N., Gilbert, H., Gouget, A., Sibert, H.: Sosemanuk, a fast software-oriented stream cipher. In: eSTREAM, ECRYPT Stream Cipher. ECRYPT-Network of Excellence in Cryptology, Call for stream Cipher Primitives-Phase 2 (2005),
  8. 8.
    Billet, O., Gilbert, H.: Resistance of SNOW 2.0 Against Algebraic Attacks. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 19–28. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  9. 9.
    ETSI/SAGE Technical report: Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 5: Design and Evaluation Report, Version 1.1 (September 2006)Google Scholar
  10. 10.
    Nyberg, K., Wallén, J.: Improved Linear Distinguishers for SNOW 2.0. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 144–162. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  11. 11.
    Watanabe, D., Biryukov, A., De Canniere, C.: A Distinguishing Attack of SNOW 2.0 with Linear Masking Method. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 222–233. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  12. 12.
    Debraize, B., Corbella, I.M.: Fault Analysis of the Stream Cipher Snow 3G. In: Proceedings of Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 103–110 (2009)Google Scholar
  13. 13.
    Brumley, B.B., Hakala, R.M., Nyberg, K., Sovio, S.: Consecutive S-box Lookups: A Timing Attack on SNOW 3G. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 171–185. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  14. 14.
    Biryukov, A., Priemuth-Schmid, D., Zhang, B.: Multiset collision attacks on reduced-round SNOW 3G and SNOW 3G⊕. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 139–153. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  15. 15.
    Orhanou, G., El Hajji, S., Bentaleb, Y.: SNOW 3G stream cipher operation and complexity study. Contemporary Engineering Sciences 3(3), 97–111 (2010)Google Scholar
  16. 16.
    Kitsos, P., Selimis, G., Koufopavlou, O.: High performance ASIC implementation of the SNOW 3G stream cipher. In: IFIP/IEEE VLSI-SOC (2008)Google Scholar
  17. 17.
    Delgado-Mohatar, O., Fúster-Sabater, A.: Software Implementation of Linear Feedback Shift Registers over Extended Fields. In: Proceedings of CISIS/ICEUTE/SOCO Special Sessions, pp. 117–126 (2012)Google Scholar

Copyright information

© Springer International Publishing Switzerland 2014

Authors and Affiliations

  • J. Molina-Gil
    • 1
  • P. Caballero-Gil
    • 1
  • C. Caballero-Gil
    • 1
  • Amparo Fúster-Sabater
    • 2
  1. 1.Department of Statistics, O.R. and ComputingUniversity of La LagunaLa LagunaSpain
  2. 2.Institute of Applied PhysicsSpanish National Research CouncilMadridSpain

Personalised recommendations