谷歌Chrome浏览器插件
订阅小程序
在清言上使用

A Correlation Attack on Full SNOW-V and SNOW-Vi

ADVANCES IN CRYPTOLOGY - EUROCRYPT 2022, PT III(2022)

引用 16|浏览6
暂无评分
摘要
In this paper, a method for searching correlations between the binary stream of Linear Feedback Shift Register (LFSR) and the keystream of SNOW-V and SNOW-Vi is presented based on the technique of approximation to composite functions. With the aid of the linear relationship between the four taps of LFSR input into Finite State Machine (FSM) at three consecutive clocks, we present an automatic search model based on the SAT/SMT technique and search out a series of linear approximation trails with high correlation. By exhausting the intermediate masks, we find a binary linear approximation with a correlation -2(-47.76). Using such approximation, we propose a correlation attack on SNOW-V with an expected time complexity 2(246.53), a memory complexity 2(238.77) and 2(237.5) keystream words generated by the same key and Initial Vector (IV). For SNOW-Vi, we provide a binary linear approximation with the same correlation and mount a correlation attack with the same complexity as that of SNOW-V. To the best of our knowledge, this is the first known attack on full SNOW-V and SNOW-Vi, which is better than the exhaustive key search with respect to time complexity. The results indicate that neither SNOW-V nor SNOW-Vi can guarantee the 256-bit security level if we ignore the design constraint that the maximum length of keystream for a single pair of key and IV is less than 2(64).
更多
查看译文
关键词
SNOW-V, SNOW-Vi, Cryptanalysis, Linear approximation, Automatic search, Correlation attack
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要