the zuc-256 stream cipher · snow 3g-256 aes in 128-eea2 & 128-eia2 ! aes-256 zuc in 128-eea3...
TRANSCRIPT
The ZUC-256 Stream Cipher
Outline
1 Background
2 Description of ZUC-256
3 Invitation for Cryptanalysis and the ZUC-256 Conference
The ZUC-256 Stream Cipher
Background
256-bit Symmetric-key Algorithms in 5G &Post-quantum Era
ETSI/SAGE 3GPP
SNOW 3G in 128-EEA1 & 128-EIA1 → SNOW 3G-256
AES in 128-EEA2 & 128-EIA2 → AES-256
ZUC in 128-EEA3 & 128-EIA3 → ZUC-256
The ZUC-256 Stream Cipher
Description of ZUC-256
ZUC-256
Configuration: a 256-bit secret key and a 184-bit IV.
Confidentiality: for each key/IV pair, the frame consists of20000 to 232 bits keystream.
Integrity: generate 32/64/128-bit authentication tags, butcould support up to 256-bit tag if needed.
The ZUC-256 Stream Cipher
Description of ZUC-256
ZUC-256
31mod 2 1
0s 1s 2s
3s 4s 5s
6s 7s 8s 9s
10s 11s
12s 13s 14s
15s
152 172 212 202
81+2
Z
15Hs
14Ls 11Ls 9Hs
7Ls 5Hs 2Ls
0Hs
Figure: The keystream generation of ZUC-256
The ZUC-256 Stream Cipher
Description of ZUC-256
ZUC-256
31mod 2 1
0s 1s 2s
3s 4s 5s
6s 7s
8s 9s 10s
11s 12s 13s
14s 15s
152 172 212
202 81+2
>> 1
15Hs
14Ls 11Ls 9Hs 7Ls
5Hs 2Ls 0Hs
Figure: The initialization phase of ZUC-256
The ZUC-256 Stream Cipher
Description of ZUC-256
ZUC-256 & ZUC-128
ZUC-256 differs from ZUC-128 only in the initialization phaseand in the message authentication codes generation phase.
http://dacas.cn/thread.aspx?ID=3621
http://www.is.cas.cn/ztzl2016/zouchongzhi/index.html
The ZUC-256 Stream Cipher
Invitation for Cryptanalysis and the ZUC-256 Conference
Cryptanalysis Awards
The best cryptanalysis paper on ZUC-256 will be awarded atthe ZUC-256 conference.
The best software/hardware implementation of ZUC-256 willalso be awarded at the ZUC-256 conference.
→ martin [email protected]
The ZUC-256 Stream Cipher
Invitation for Cryptanalysis and the ZUC-256 Conference
ZUC-256 Conference Time
The 6th of July, 2018 at Beijing, China
The ZUC-256 Stream Cipher
Invitation for Cryptanalysis and the ZUC-256 Conference