Spectral analysis of ZUC-256

In this paper we develop a number of generic techniques and algorithms in spectral analysis of large linear approximations for use in cryptanalysis. We apply the developed tools for cryptanalysis of ZUC-256 and give a distinguishing attack with complexity around 2236. Although the attack is only 22...

Full description

Bibliographic Details
Main Authors: Jing Yang, Thomas Johansson, Alexander Maximov
Format: Article
Language:English
Published: Ruhr-Universität Bochum 2020-05-01
Series:IACR Transactions on Symmetric Cryptology
Subjects:
Online Access:https://tosc.iacr.org/index.php/ToSC/article/view/8565
id doaj-10617f3bd8b2475b8071c60c15bab10d
record_format Article
spelling doaj-10617f3bd8b2475b8071c60c15bab10d2021-04-02T14:24:35ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2020-05-012020110.13154/tosc.v2020.i1.266-288Spectral analysis of ZUC-256Jing Yang0Thomas Johansson1Alexander Maximov2Dept. of Electrical and Information Technology, Lund University, Lund, SwedenDept. of Electrical and Information Technology, Lund University, Lund, SwedenEricsson Research, Lund, Sweden In this paper we develop a number of generic techniques and algorithms in spectral analysis of large linear approximations for use in cryptanalysis. We apply the developed tools for cryptanalysis of ZUC-256 and give a distinguishing attack with complexity around 2236. Although the attack is only 220 times faster than exhaustive key search, the result indicates that ZUC-256 does not provide a source with full 256-bit entropy in the generated keystream, which would be expected from a 256-bit key. To the best of our knowledge, this is the first known academic attack on full ZUC-256 with a computational complexity that is below exhaustive key search. https://tosc.iacr.org/index.php/ToSC/article/view/8565ZUC-256Stream Cipher5G Mobile System Security
collection DOAJ
language English
format Article
sources DOAJ
author Jing Yang
Thomas Johansson
Alexander Maximov
spellingShingle Jing Yang
Thomas Johansson
Alexander Maximov
Spectral analysis of ZUC-256
IACR Transactions on Symmetric Cryptology
ZUC-256
Stream Cipher
5G Mobile System Security
author_facet Jing Yang
Thomas Johansson
Alexander Maximov
author_sort Jing Yang
title Spectral analysis of ZUC-256
title_short Spectral analysis of ZUC-256
title_full Spectral analysis of ZUC-256
title_fullStr Spectral analysis of ZUC-256
title_full_unstemmed Spectral analysis of ZUC-256
title_sort spectral analysis of zuc-256
publisher Ruhr-Universität Bochum
series IACR Transactions on Symmetric Cryptology
issn 2519-173X
publishDate 2020-05-01
description In this paper we develop a number of generic techniques and algorithms in spectral analysis of large linear approximations for use in cryptanalysis. We apply the developed tools for cryptanalysis of ZUC-256 and give a distinguishing attack with complexity around 2236. Although the attack is only 220 times faster than exhaustive key search, the result indicates that ZUC-256 does not provide a source with full 256-bit entropy in the generated keystream, which would be expected from a 256-bit key. To the best of our knowledge, this is the first known academic attack on full ZUC-256 with a computational complexity that is below exhaustive key search.
topic ZUC-256
Stream Cipher
5G Mobile System Security
url https://tosc.iacr.org/index.php/ToSC/article/view/8565
work_keys_str_mv AT jingyang spectralanalysisofzuc256
AT thomasjohansson spectralanalysisofzuc256
AT alexandermaximov spectralanalysisofzuc256
_version_ 1721562305882226688