Spectral analysis of ZUC-256
In this paper we develop a number of generic techniques and algorithms in spectral analysis of large linear approximations for use in cryptanalysis. We apply the developed tools for cryptanalysis of ZUC-256 and give a distinguishing attack with complexity around 2236. Although the attack is only 22...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Ruhr-Universität Bochum
2020-05-01
|
Series: | IACR Transactions on Symmetric Cryptology |
Subjects: | |
Online Access: | https://tosc.iacr.org/index.php/ToSC/article/view/8565 |
id |
doaj-10617f3bd8b2475b8071c60c15bab10d |
---|---|
record_format |
Article |
spelling |
doaj-10617f3bd8b2475b8071c60c15bab10d2021-04-02T14:24:35ZengRuhr-Universität BochumIACR Transactions on Symmetric Cryptology2519-173X2020-05-012020110.13154/tosc.v2020.i1.266-288Spectral analysis of ZUC-256Jing Yang0Thomas Johansson1Alexander Maximov2Dept. of Electrical and Information Technology, Lund University, Lund, SwedenDept. of Electrical and Information Technology, Lund University, Lund, SwedenEricsson Research, Lund, Sweden In this paper we develop a number of generic techniques and algorithms in spectral analysis of large linear approximations for use in cryptanalysis. We apply the developed tools for cryptanalysis of ZUC-256 and give a distinguishing attack with complexity around 2236. Although the attack is only 220 times faster than exhaustive key search, the result indicates that ZUC-256 does not provide a source with full 256-bit entropy in the generated keystream, which would be expected from a 256-bit key. To the best of our knowledge, this is the first known academic attack on full ZUC-256 with a computational complexity that is below exhaustive key search. https://tosc.iacr.org/index.php/ToSC/article/view/8565ZUC-256Stream Cipher5G Mobile System Security |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Jing Yang Thomas Johansson Alexander Maximov |
spellingShingle |
Jing Yang Thomas Johansson Alexander Maximov Spectral analysis of ZUC-256 IACR Transactions on Symmetric Cryptology ZUC-256 Stream Cipher 5G Mobile System Security |
author_facet |
Jing Yang Thomas Johansson Alexander Maximov |
author_sort |
Jing Yang |
title |
Spectral analysis of ZUC-256 |
title_short |
Spectral analysis of ZUC-256 |
title_full |
Spectral analysis of ZUC-256 |
title_fullStr |
Spectral analysis of ZUC-256 |
title_full_unstemmed |
Spectral analysis of ZUC-256 |
title_sort |
spectral analysis of zuc-256 |
publisher |
Ruhr-Universität Bochum |
series |
IACR Transactions on Symmetric Cryptology |
issn |
2519-173X |
publishDate |
2020-05-01 |
description |
In this paper we develop a number of generic techniques and algorithms in spectral analysis of large linear approximations for use in cryptanalysis. We apply the developed tools for cryptanalysis of ZUC-256 and give a distinguishing attack with complexity around 2236. Although the attack is only 220 times faster than exhaustive key search, the result indicates that ZUC-256 does not provide a source with full 256-bit entropy in the generated keystream, which would be expected from a 256-bit key. To the best of our knowledge, this is the first known academic attack on full ZUC-256 with a computational complexity that is below exhaustive key search.
|
topic |
ZUC-256 Stream Cipher 5G Mobile System Security |
url |
https://tosc.iacr.org/index.php/ToSC/article/view/8565 |
work_keys_str_mv |
AT jingyang spectralanalysisofzuc256 AT thomasjohansson spectralanalysisofzuc256 AT alexandermaximov spectralanalysisofzuc256 |
_version_ |
1721562305882226688 |