A distinguishing attack of SNOW 2.0 with linear masking method

41Citations
Citations of this article
32Readers
Mendeley users who have this article in their library.

Abstract

SNOW 2.0 was developed by Johansson and Ekdahl in 2002, as a modified version of SNOW 1.0. In this paper we present the application of linear (masking) attack to SNOW 2.0 stream cipher. Our attack requires 2225 output words (2230 bits) and 2225 steps of analysis to distinguish the output of SNOW 2.0 from a truly random bit sequence. © Springer-Verlag Berlin Heidelberg 2004.

Cite

CITATION STYLE

APA

Watanabe, D., Biryukov, A., & De Cannière, C. (2004). A distinguishing attack of SNOW 2.0 with linear masking method. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3006, 222–233. https://doi.org/10.1007/978-3-540-24654-1_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free