A different algebraic analysis on ZUC stream cipher

نویسنده

  • Mufeed AlMashrafi
چکیده

Preliminary algebraic analysis of the ZUC cipher indicates that the cipher may be vulnerable to algebraic attack. In this paper we present an alternative algebraic analysis method for the ZUC stream cipher, using a combiner to represent the nonlinear function. This approach can recover the initial state of ZUC from an observed 2 words of keystream, with a complexity of 2 operations. This method is particularly successful when applied to a modified version of ZUC, where the number of output words per clock is increased.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Differential Power Analysis on ZUC Algorithm

Stream cipher ZUC plays a crucial role in the next generation of mobile communication as it has already been included by the 3GPP LTE-Advanced, which is a candidate standard for the 4G network. Through a long-time evaluation program, ZUC algorithm is thought to be robust enough to resist many existing cryptanalyses, but not for DPA, one of the most powerful threat of SCAs(Side Channel Analysis)...

متن کامل

Differential Attacks against Stream Cipher ZUC

Stream cipher ZUC is the core component in the 3GPP confidentiality and integrity algorithms 128-EEA3 and 128-EIA3. In this paper, we present the details of our differential attacks against ZUC 1.4. The vulnerability in ZUC 1.4 is due to the non-injective property in the initialization, which results in the difference in the initialization vector being cancelled. In the first attack, difference...

متن کامل

The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures

The core of the 3 Generation Partnership Project (3GPP) encryption standard 128-EEA3 is a stream cipher called ZUC. It was designed by the Chinese Academy of Sciences and proposed for inclusion in the cellular wireless standards called “Long Term Evolution” or “4G”. The LFSR-based cipher uses a 128-bit key. In this paper, we first show timing attacks on ZUC that can recover, with about 71.43% s...

متن کامل

Linear Approximations of Addition Modulo 2n

Addition modulo 2 − 1 is a basic arithmetic operation in the stream cipher ZUC. For evaluating ZUC in resistance to linear cryptanalysis, it is necessary to study properties of linear approximations of the addition modulo 2 − 1. In this paper we discuss linear approximations of the addition modulo 2 − 1 for integer n ≥ 2. As results, an exact formula on the correlations of linear approximations...

متن کامل

An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks

To date, most applications of algebraic analysis and attacks on stream ciphers are on those based on linear feedback shift registers (LFSRs). In this paper, we extend algebraic analysis to non-LFSR based stream ciphers. Specifically, we perform an algebraic analysis on the RC4 family of stream ciphers, an example of stream ciphers based on dynamic tables, and investigate its implications to pot...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012