没有合适的资源?快使用搜索试试~ 我知道了~
首页SNOW 3G Specification
资源详情
资源评论
资源推荐

3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. page 1 of 37
SNOW 3G Algorithm Specification Version 1.1
ETSI/SAGE
Specification
Version: 1.1
Date: 6
th
September 2006
Specification of the 3GPP Confidentiality and
Integrity Algorithms UEA2 & UIA2.
Document 2: SNOW 3G Specification
The SNOW 3G algorithm is the core of the standardised 3GPP
Confidentiality and Integrity algorithms UEA2 & UIA2.

3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. page 2 of 37
SNOW 3G Algorithm Specification Version 1.1
Document History
V1.0 10
th
January 2006 Publication
V1.1 6
th
September 2006 No change to the algorithm specification at all, just
removal of an unwanted page header

3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. page 3 of 37
SNOW 3G Algorithm Specification Version 1.1
PREFACE
This specification has been prepared by the 3GPP Task Force, and gives a detailed
specification of the 3GPP Algorithm SNOW 3G. SNOW 3G is a stream cipher that forms the
heart of the 3GPP confidentiality algorithm UEA2 and the 3GPP integrity algorithm UIA2.
This document is the second of four, which between them form the entire specification of
3GPP Confidentiality and Integrity Algorithms:
• Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 &
UIA2.
Document 1: UEA2 and UIA2 Algorithm Specifications.
• Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 &
UIA2.
Document 2: SNOW 3G Algorithm Specification.
• Specification of the 3GPP Encryption and Confidentiality Algorithms UEA2 &
UIA2.
Document 3: Implementors’ Test Data.
• Specification of the 3GPP Encryption and Confidentiality Algorithms UEA2 &
UIA2.
Document 4: Design Conformance Test Data.
The normative part of the specification of SNOW 3G is in the main body of this document.
The annexes to this document are purely informative. Annex 1 contains remarks about the
mathematical background of some functions of SNOW 3G. Annex 2 contains implementation
options for some functions of SNOW 3G. Annex 3 contains illustrations of functional
elements of the algorithm, while Annex 4 contains an implementation program listing of the
cryptographic algorithm specified in the main body of this document, written in the
programming language C.
Similarly the normative part of the specification of the UEA2 (confidentiality) and the UIA2
(integrity) algorithms is in the main body of Document 1. The annexes of those documents
and Documents 3 and 4 above, are purely informative.

3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. page 4 of 37
SNOW 3G Algorithm Specification Version 1.1
Blank Page

3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. page 5 of 37
SNOW 3G Algorithm Specification Version 1.1
TABLE OF CONTENTS
1.
Outline of the Normative Part of the Document.................................................................8
2.
Introductory Information ....................................................................................................8
2.1.
Introduction.................................................................................................................8
2.2.
Notation ......................................................................................................................8
3.
Components of SNOW 3G ...............................................................................................10
3.1.
Functions used in different Components of SNOW 3G ...........................................10
3.2.
Linear Feedback Shift Register (LFSR) ...................................................................10
3.3.
Finite State Machine (FSM) .....................................................................................10
3.4.
The Clocking Operations ..........................................................................................11
4.
Operation of SNOW 3G ...................................................................................................12
4.1.
Initialisation ..............................................................................................................12
4.2.
Generation of Keystream ..........................................................................................13
5.
Definition of Tables used in SNOW 3G...........................................................................14
ANNEX 1
Remarks about the mathematical background of some operations of the
SNOW 3G Algorithm...............................................................................................................17
1.1
MULx and MULxPOW............................................................................................17
1.2
The S-Box S
1
used in the FSM .................................................................................17
1.3
The S-Box S
Q
used in the S-Box S2 .........................................................................17
1.4
The S-Box S
2
used in the FSM .................................................................................18
1.5
Interpretation of the 32-bit words contained in the LFSR as elements of
GF(2
32
)..............................................................................................................................18
ANNEX 2
Implementation options for some operations of the SNOW 3G
Algorithm 19
2.1.
The S-Box S
1
used in the FSM .................................................................................19
2.2.
The S-Box S
2
used in the FSM .................................................................................19
2.3.
The functions MUL
α
and DIV
α
used in the LFSR....................................................19
2.4.
Definitions of tables for the FSM .............................................................................20
2.5.
Definitions of tables for the LFSR............................................................................28
ANNEX 3
Figures of the SNOW 3G Algorithm..................................................................30
SNOW 3G Algorithm during key initialisation................................................................30
SNOW 3G Algorithm during keystream-generation........................................................31
ANNEX 4
Simulation Program Listing................................................................................32
4.1.
Header file ................................................................................................................32
4.2.
Code..........................................................................................................................32
剩余36页未读,继续阅读













pixyonly
- 粉丝: 0
- 资源: 6
上传资源 快速赚钱
我的内容管理 收起
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助

会员权益专享
安全验证
文档复制为VIP权益,开通VIP直接复制

评论0