Two versions of the stream cipher snow

Download
2004
Yılmaz, Erdem
Two versions of SNOW, which are word-oriented stream ciphers proposed by P. Ekdahl and T. Johansson in 2000 and 2002, are studied together with cryptanalytic attacks on the first version. The reported attacks on SNOW1.0 are the 3guess-and-determine attack4s by Hawkes and Rose and the 3distinguishing attack4 by Coppersmith, Halevi and Jutla in 2002. A review of the distinguishing attack on SNOW1.0 is given using the approach made by the designers of SNOW in 2002 on another cipher, SOBER-t32. However, since the calculation methods for the complexities of the attack are different, the values found with the method of the designers of SNOW are higher than the ones found by Coppersmith, Halevi and Jutla. The correlations in the finite state machine that make the distinguishing attack possible and how these correlations are affected by the operations in the finite state machine are investigated. Since the substitution boxes (S-boxes) play an important role in destroying the correlation and linearity caused by Linear Feedback Shift Register, the s-boxes of the two versions of SNOW are examined for the criteria of Linear Approximation Table (LAT), Difference Distribution Table (DDT) and Auto-correlation Table distributions. The randomness tests are performed using NIST statistical test suite for both of the ciphers. The results of the tests are presented.

Suggestions

NORMAL SOLVABILITY OF ELLIPTIC BOUNDARY-VALUE-PROBLEMS ON ASYMPTOTICALLY FLAT MANIFOLDS
ERKIP, AK; SCHROHE, E (Elsevier BV, 1992-10-01)
Normal solvability is shown for a class of boundary value problems on Riemannian manifolds with noncompact boundary using a concept of weighted pseudodifferential operators and weighted Sobolev spaces together with Lopatinski-Shapiro type boundary conditions. An essential step is to show that the standard normal derivative defined in terms of the Riemannian metric is in fact a weighted pseudodifferential operator of the considered class provided the metric is compatible with the symbols.
ANALYSIS OF THE TRUNCATED SPIKE ALGORITHM
MİKKELSEN, CCK; Manguoğlu, Murat (Society for Industrial & Applied Mathematics (SIAM), 2008-01-01)
The truncated SPIKE algorithm is a parallel solver for linear systems which are banded and strictly diagonally dominant by rows. There are machines for which the current implementation of the algorithm is faster and scales better than the corresponding solver in ScaLAPACK (PDDBTRF/PDDBTRS). In this paper we prove that the SPIKE matrix is strictly diagonally dominant by rows with a degree no less than the original matrix. We establish tight upper bounds on the decay rate of the spikes as well as the truncati...
Basis in nuclear Frechet spaces
Erkurşun, Nazife; Nurlu, Mehmet Zafer; Department of Mathematics (2006)
Existence of basis in locally convex space has been an important problem in functional analysis for more than 40 years. In this thesis the conditions for the existence of basis are examined. These thesis consist of three parts. The first part is about the exterior interpolative conditions. The second part deals with the inner interpolative conditions on nuclear frechet space. These are sufficient conditions on existence of basis. In the last part, it is shown that for a regular nuclear Köthe space the inner...
A hybrid methodology in process modeling: “from-to chart based process discovery”
Esgin, Eren; Karagöz, Pınar; Department of Information Systems (2009)
The managing of complex business processes, which are changed due to globalization, calls for the development of powerful information systems that offer generic process modeling and process execution capabilities. Even though contemporary information systems are more and more utilized in enterprises, their actual impact in automatizing complex business process is still limited by the difficulties encountered in design phase. Actually this design phase is time consuming, often subjective and incomplete. In t...
Development of an incompressible navier-stokes solver with alternating cell direction implicit method on structured and unstructured quadrilateral grids
Baş, Onur; Tuncer, İsmail Hakkı; Department of Aerospace Engineering (2007)
In this research, the Alternating Cell Direction Implicit method is used in temporal discretisation of the incompressible Navier-Stokes equations and compared with the well known and widely used Point Gauss Seidel scheme on structured and quadrilateral unstructured meshes. A two dimensional, laminar and incompressible Navier-Stokes solver is developed for this purpose using the artificial compressibility formulation. The developed solver is used to obtain steady-state solutions with implicit time stepping m...
Citation Formats
E. Yılmaz, “Two versions of the stream cipher snow,” M.S. - Master of Science, Middle East Technical University, 2004.