Abstract
In 2000, the stream cipher SNOW was proposed. A few attacks followed, indicating certain weaknesses in the design. In this paper we propose a new version of SNOW, called SNOW 2.0. The new version of the cipher does not only appear to be more secure, but its implementation is also a bit faster in software.
Chapter PDF
Similar content being viewed by others
References
D. Coppersmith, S. Halevi, C. Jutla, “Cryptanalysis of stream ciphers with linear masking”, To appear in Advances in Cryptology-CRYPTO 2002, Lecture Notes in Computer Science, Springer, 2002.
D. Coppersmith, S. Halevi, C. Jutla, “Scream: a software-efficient stream cipher”, In Fast Software Encryption (FSE) 2002, Lecture Notes in Computer Science, vol. 2365, Springer 2002, 195–209.
D. Coppersmith, P. Rogaway, “Software-efficient pseudorandom function and the use thereof for encryption”, US Patent 5,454,039, 1995.
J. Daemen, V. Rijmen, “The design of Rijndael”, Springer Verlag Series on Information Security and Cryptography, Springer Verlag, 2002, ISBN 3-540-42580-2.
P. Ekdahl, T. Johansson, “SNOW-a new stream cipher”, Proceedings of first NESSIE Workshop, Heverlee, Belgium, 2000.
P. Ekdahl, T. Johansson, “Distinguishing attacks on SOBER”, In Fast Software Encryption (FSE) 2002, Lecture Notes in Computer Science, vol. 2365, Springer 2002, 210–224.
P. Hawkes, “Guess-and-determine attacks on SNOW”, private correspondence, 2002.
P. Hawkes, G. Rose, “Guess-and-determine attacks on SNOW”, Preproceedings of Selected Areas in Cryptography (SAC), August 2002, St John’s, Newfoundland, Canada.
P. Hawkes, G. Rose “Primitive Specification and supportion documentation for SOBER-t16 submission to NESSIE”, Proceedings of first NESSIE Workshop, Heverlee, Belgium, 2000.
P. Hawkes, G. Rose “Primitive Specification and supportion documentation for SOBER-t32 submission to NESSIE”, Proceedings of first NESSIE Workshop, Heverlee, Belgium, 2000.
L. Knudsen, W. Meier, B. Preneel, V. Rijmen, S. Verdoolaege, “Analysis methods for (alleged) RC4”, Lecture Notes in Computer Science, vol. 1514, pp. 327–341., (Asiacrypt’98).
I. Mantin, A. Shamir, “A practical attack on RC4”, In Fast Software Encryption (FSE) 2001, Lecture Notes in Computer SCience, vol. 2355, Springer 2002.
A. Menezes, P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, 1997.
R. Rivest, “The RC4 encryption algorithm”, RSA Data Security, Inc. Mar. 1992.
P. Rogaway, D. Coppersmith, “A software optimized encryption algorithm”. Journal of Cryptology, 11(4):273–287, 1998.
D. Watanabe, S. Furuya, H. Yoshida, B. Preneel, “A new keystream generator MUGI”, In Fast Software Encryption (FSE) 2002, Lecture Notes in Computer Science, vol. 2365, Springer 2002, 179–194.
M. Zhang, C. Caroll, A. Chan, “The software-oriented stream cipher SSC2”, In Fast Software Encryption (FSE) 2000, Lecture Notes in Computer Science, vol. 1978, Springer 2001, 31–48.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Ekdahl, P., Johansson, T. (2003). A New Version of the Stream Cipher SNOW. In: Nyberg, K., Heys, H. (eds) Selected Areas in Cryptography. SAC 2002. Lecture Notes in Computer Science, vol 2595. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36492-7_5
Download citation
DOI: https://doi.org/10.1007/3-540-36492-7_5
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00622-0
Online ISBN: 978-3-540-36492-4
eBook Packages: Springer Book Archive