SNOW

Summary

SNOW 1.0, SNOW 2.0, and SNOW 3G are word-based synchronous stream ciphers developed by Thomas Johansson and Patrik Ekdahl at Lund University.

History edit

SNOW 1.0, originally simply SNOW, was submitted to the NESSIE project. The cipher has no known intellectual property or other restrictions. The cipher works on 32-bit words and supports both 128- and 256-bit keys. The cipher consists of a combination of a LFSR and a Finite State Machine (FSM) where the LFSR also feeds the next state function of the FSM. The cipher has a short initialization phase and very good performance on both 32-bit processors and in hardware.

During the evaluation, weaknesses were discovered and as a result, SNOW was not included in the NESSIE suite of algorithms. The authors have developed a new version, version 2.0 of the cipher, that solves the weaknesses and improves the performance.

During ETSI SAGE evaluation, the design was further modified to increase its resistance against algebraic attacks with the result named SNOW 3G.[1]

It has been found that related keys exist both for SNOW 2.0 and SNOW 3G,[2] allowing attacks against SNOW 2.0 in the related-key model.

Use edit

SNOW has been used in the ESTREAM project as a reference cipher for the performance evaluation.

SNOW 2.0 is one out of stream ciphers chosen for ISO/IEC standard ISO/IEC 18033-4.[3]

SNOW 3G[4] is chosen as the stream cipher for the 3GPP encryption algorithms UEA2 and UIA2.[5]

Sources edit

  1. ^ UEA2 Design and Evaluation Report
  2. ^ Kircanski, Aleksandar; Youssef, Amr (15 April 2012). "On the Sliding Property of SNOW 3G and SNOW 2.0" (PDF). Retrieved 19 October 2021.
  3. ^ "ISO/IEC 18033-4:2011 Information technology — Security techniques — Encryption algorithms — Part 4: Stream ciphers". ISO. Retrieved 30 October 2020.
  4. ^ "Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 2: SNOW 3G Specification" (PDF). www.gsma.com. 6 September 2006. Retrieved 13 October 2017.
  5. ^ "Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 1: UEA2 and UIA2 Specification" (PDF). www.quintillion.co.jp. Archived from the original (PDF) on 19 March 2012. Retrieved 30 October 2020.

External links edit

  • The Lund Crypto and Security group website