Abstract
The fourth generation of cell phones, marketed as 4G/LTE (Long-Term Evolution) is being quickly adopted worldwide. Given the mobile and wireless nature of the involved communications, security is crucial. This paper includes both a theoretical study and a practical analysis of the SNOW 3G generator, included in such a standard for protecting confidentiality and integrity. From its implementation and performance evaluation in mobile devices, several conclusions about how to improve its efficiency are obtained.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
ETSI/SAGE. Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 2: SNOW 3G Specification, version 1.1 (September 2006), http://www.3gpp.org/ftp/
Ekdahl, P., Johansson, T.: SNOW - a new stream cipher. In: Proceedings of NESSIE Workshop (2000)
Ekdahl, P., Johansson, T.: A New Version of the Stream Cipher SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 47–61. Springer, Heidelberg (2003)
Hawkes, P., Rose, G.G.: Guess-and-determine attacks on SNOW. In: Nyberg, K., Heys, H.M. (eds.) SAC 2002. LNCS, vol. 2595, pp. 37–46. Springer, Heidelberg (2003)
Coppersmith, D., Halevi, S., Jutla, C.S.: Cryptanalysis of stream ciphers with linear masking. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 515–532. Springer, Heidelberg (2002)
ISO/IEC 18033-4:2005. Information technology - Security techniques - Encryption algorithms - Part 4: Stream ciphers, http://www.iso.org/iso/home/store/catalogue_ics/
Berbain, C., Billet, O., Canteaut, A., Courtois, N., Gilbert, H., Gouget, A., Sibert, H.: Sosemanuk, a fast software-oriented stream cipher. In: eSTREAM, ECRYPT Stream Cipher. ECRYPT-Network of Excellence in Cryptology, Call for stream Cipher Primitives-Phase 2 (2005), http://www.ecrypt.eu.org/stream
Billet, O., Gilbert, H.: Resistance of SNOW 2.0 Against Algebraic Attacks. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 19–28. Springer, Heidelberg (2005)
ETSI/SAGE Technical report: Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 5: Design and Evaluation Report, Version 1.1 (September 2006)
Nyberg, K., Wallén, J.: Improved Linear Distinguishers for SNOW 2.0. In: Robshaw, M. (ed.) FSE 2006. LNCS, vol. 4047, pp. 144–162. Springer, Heidelberg (2006)
Watanabe, D., Biryukov, A., De Canniere, C.: A Distinguishing Attack of SNOW 2.0 with Linear Masking Method. In: Matsui, M., Zuccherato, R.J. (eds.) SAC 2003. LNCS, vol. 3006, pp. 222–233. Springer, Heidelberg (2004)
Debraize, B., Corbella, I.M.: Fault Analysis of the Stream Cipher Snow 3G. In: Proceedings of Workshop on Fault Diagnosis and Tolerance in Cryptography, pp. 103–110 (2009)
Brumley, B.B., Hakala, R.M., Nyberg, K., Sovio, S.: Consecutive S-box Lookups: A Timing Attack on SNOW 3G. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 171–185. Springer, Heidelberg (2010)
Biryukov, A., Priemuth-Schmid, D., Zhang, B.: Multiset collision attacks on reduced-round SNOW 3G and SNOW 3G⊕. In: Zhou, J., Yung, M. (eds.) ACNS 2010. LNCS, vol. 6123, pp. 139–153. Springer, Heidelberg (2010)
Orhanou, G., El Hajji, S., Bentaleb, Y.: SNOW 3G stream cipher operation and complexity study. Contemporary Engineering Sciences 3(3), 97–111 (2010)
Kitsos, P., Selimis, G., Koufopavlou, O.: High performance ASIC implementation of the SNOW 3G stream cipher. In: IFIP/IEEE VLSI-SOC (2008)
Delgado-Mohatar, O., Fúster-Sabater, A.: Software Implementation of Linear Feedback Shift Registers over Extended Fields. In: Proceedings of CISIS/ICEUTE/SOCO Special Sessions, pp. 117–126 (2012)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Molina-Gil, J., Caballero-Gil, P., Caballero-Gil, C., Fúster-Sabater, A. (2014). Analysis and Implementation of the SNOW 3G Generator Used in 4G/LTE Systems. In: Herrero, Á., et al. International Joint Conference SOCO’13-CISIS’13-ICEUTE’13. Advances in Intelligent Systems and Computing, vol 239. Springer, Cham. https://doi.org/10.1007/978-3-319-01854-6_51
Download citation
DOI: https://doi.org/10.1007/978-3-319-01854-6_51
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-01853-9
Online ISBN: 978-3-319-01854-6
eBook Packages: EngineeringEngineering (R0)