2012 | OriginalPaper | Chapter
Differential Attacks against Stream Cipher ZUC
Authors : Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang, San Ling
Published in: Advances in Cryptology – ASIACRYPT 2012
Publisher: Springer Berlin Heidelberg
Activate our intelligent search to find suitable subject content or patents.
Select sections of text to find matching patents with Artificial Intelligence. powered by
Select sections of text to find additional relevant content using AI-assisted search. powered by
Stream cipher ZUC is the core component in the 3GPP confidentiality and integrity algorithms 128-EEA3 and 128-EIA3. In this paper, we present the details of our differential attacks against ZUC 1.4. The vulnerability in ZUC 1.4 is due to the non-injective property in the initialization, which results in the difference in the initialization vector being cancelled. In the first attack, difference is injected into the first byte of the initialization vector, and one out of 2
15.4
random keys result in two identical keystreams after testing 2
13.3
IV pairs for each key. The identical keystreams pose a serious threat to the use of ZUC 1.4 in applications since it is similar to reusing a key in one-time pad. Once identical keystreams are detected, the key can be recovered with average complexity 2
99.4
. In the second attack, difference is injected into the second byte of the initialization vector, and every key can result in two identical keystreams with about 2
54
IVs. Once identical keystreams are detected, the key can be recovered with complexity 2
67
. We have presented a method to fix the flaw by updating the LFSR in an injective way in the initialization. Our suggested method is used in the later versions of ZUC. The latest ZUC 1.6 is secure against our attacks.