Paper 2020/1215

Differential analysis of the ZUC-256 initialisation

Steve Babbage and Alexander Maximov

Abstract

This short report contains results of a brief cryptanalysis of the initialisation phase of ZUC-256. We find IV differentials that persist for 26 of the 33 initialisation rounds, and Key differentials that persist for 28 of the 33 rounds.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint.
Keywords
3GPP5GZUC-256
Contact author(s)
steve babbage @ vodafone com
alexander maximov @ ericsson com
History
2020-10-06: received
Short URL
https://ia.cr/2020/1215
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/1215,
      author = {Steve Babbage and Alexander Maximov},
      title = {Differential analysis of the ZUC-256 initialisation},
      howpublished = {Cryptology ePrint Archive, Paper 2020/1215},
      year = {2020},
      note = {\url{https://eprint.iacr.org/2020/1215}},
      url = {https://eprint.iacr.org/2020/1215}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.