SNOW V: A new version of SNOW for 5G
Patrik Ekdahl2, Thomas Johansson1, Alexander Maximov2, Jing Yang1
1 Department of Electrical and Information Technology, Lund University 2 Ericsson Research, Ericsson
SNOW V: A new version of SNOW for 5G Patrik Ekdahl 2 , Thomas - - PowerPoint PPT Presentation
SNOW V: A new version of SNOW for 5G Patrik Ekdahl 2 , Thomas Johansson 1 , Alexander Maximov 2 , Jing Yang 1 1 Department of Electrical and Information Technology, Lund University 2 Ericsson Research, Ericsson Outline Motivation Motivation
1 Department of Electrical and Information Technology, Lund University 2 Ericsson Research, Ericsson
Motivation SNOW V Performance Analysis Security Analysis Conclusion
2/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
3/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
4/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
4/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
4/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
5/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
F S M L F S R 3 2
i t
3 2
i t 3 2
i t
AE S S
+ Mi x C
u mn
5/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
Internet
Session keys Session keys Session keys
6/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
Internet
Session keys Session keys Session keys
6/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
Internet
Session keys Session keys Session keys
6/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
7/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
7/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
7/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
8/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
9/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
1
2 10/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
11/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
K / I V S e t u p
12/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
13/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
13/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
13/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
13/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
14/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
15/22 R2b 0 1 R2a R3a R3b AES Enc Round
INhi INlow OUThi OUTlow
R1b R1a D
1 0 0 1 0 1 0 1
AND
T2 T1
64 bits of keystream z M4 M1 M5 M2 M3 GF
64 64
A0 A1 A3
AND
GZ
B3 B2 B1 B0
GA
LFSR-A Feedback AND
A2
LFSR-B Feedback
IN_DATA
M6
OUT_DATA
64 64 FSM & CONTROL UNIT
LOAD CLK CEnable READY
secondary critical path
1 0
Motivation SNOW V Performance Analysis Security Analysis Conclusion
15/22 R2b 0 1 R2a R3a R3b AES Enc Round
INhi INlow OUThi OUTlow
R1b R1a D
1 0 0 1 0 1 0 1
AND
T2 T1
64 bits of keystream z M4 M1 M5 M2 M3 GF
64 64
A0 A1 A3
AND
GZ
B3 B2 B1 B0
GA
LFSR-A Feedback AND
A2
LFSR-B Feedback
IN_DATA
M6
OUT_DATA
64 64 FSM & CONTROL UNIT
LOAD CLK CEnable READY
secondary critical path
1 0
R2b
0 1
R2a R3a R3b AES Enc Round
INhi INlow OUThi OUTlow
R1b R1a D
1 0 0 1 0 1 0 1
AND
T2 T1
64 bits of keystream z M4 M1 M5 M2 M3 GF
64 64
A0 A1 A3
AND
GZ
B3 B2 B1 B0
GA
LFSR-A Feedback AND
A2
LFSR-B Feedback
IN_DATA
M6
OUT_DATA
64 64 FSM & CONTROL UNIT
LOAD CLK CEnable READY
secondary critical path
1 0
Motivation SNOW V Performance Analysis Security Analysis Conclusion
15/22 R2b 0 1 R2a R3a R3b AES Enc Round
INhi INlow OUThi OUTlow
R1b R1a D
1 0 0 1 0 1 0 1
AND
T2 T1
64 bits of keystream z M4 M1 M5 M2 M3 GF
64 64
A0 A1 A3
AND
GZ
B3 B2 B1 B0
GA
LFSR-A Feedback AND
A2
LFSR-B Feedback
IN_DATA
M6
OUT_DATA
64 64 FSM & CONTROL UNIT
LOAD CLK CEnable READY
secondary critical path
1 0
R2b
0 1
R2a R3a R3b AES Enc Round
INhi INlow OUThi OUTlow
R1b R1a D
1 0 0 1 0 1 0 1
AND
T2 T1
64 bits of keystream z M4 M1 M5 M2 M3 GF
64 64
A0 A1 A3
AND
GZ
B3 B2 B1 B0
GA
LFSR-A Feedback AND
A2
LFSR-B Feedback
IN_DATA
M6
OUT_DATA
64 64 FSM & CONTROL UNIT
LOAD CLK CEnable READY
secondary critical path
1 0
Motivation SNOW V Performance Analysis Security Analysis Conclusion
16/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
17/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
18/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
18/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
i
1
1 2 . . n
x∈{0,1}n fi(x)
19/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
20/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
20/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
21/22
Motivation SNOW V Performance Analysis Security Analysis Conclusion
22/22