HearLore
ListenSearchLibrary

Follow the threads

Every story connects to a hundred more

Topics
  • Browse all topics
  • Featured
  • Recently added
Categories
  • Browse all categories
  • For you
Answers
  • All answer pages
Journal
  • All entries
  • RSS feed
Terms of service·Privacy policy

2026 HearLore

Preview of HearLore

Free to follow every thread. No paywall, no dead ends.

Snow

Thomas Johansson and Patrik Ekdahl stood at the intersection of pure mathematics and practical engineering when they began designing SNOW at Lund University in the late 1990s. Their creation was not merely a mathematical curiosity but a response to the urgent need for fast, secure encryption in an era where digital communication was exploding. The core of their design relied on a 512-bit linear feedback shift register, a complex mechanism that processes data in 32-bit words, followed by a non-linear output state machine that added layers of security. This architecture allowed the cipher to advance the register by 32 bits with each iteration, producing 32 bits of output, a balance that made it exceptionally efficient on both 32-bit processors and hardware implementations. The simplicity of the design was deceptive, as it hid a sophisticated interplay between the linear feedback shift register and the finite-state machine, where the register also fed the next state function of the machine. This dual-layer approach ensured that the cipher could handle the growing demands of global data transmission without sacrificing speed or security.

The NESSIE Rejection

The journey of SNOW 1.0, originally submitted to the NESSIE project, ended in a surprising twist that would redefine its future. Despite its elegant design and robust performance, weaknesses were discovered during the rigorous evaluation process, leading to its exclusion from the NESSIE suite of algorithms. This rejection was not a failure of the authors but a testament to the rigorous standards of the cryptographic community. The discovery of these vulnerabilities forced Johansson and Ekdahl to rethink their approach, leading to the development of SNOW 2.0, which addressed the identified weaknesses and improved performance. The transition from SNOW 1.0 to SNOW 2.0 was a critical moment in the cipher's history, as it demonstrated the adaptability and resilience of the design. The authors' ability to respond to criticism and refine their work highlighted the importance of peer review in the field of cryptography. This process also underscored the dynamic nature of cryptographic research, where even the most promising designs must withstand intense scrutiny to be considered secure.

The 3G Revolution

The evolution of SNOW continued with the development of SNOW 3G, a version specifically tailored for the emerging needs of mobile communication. During the ETSI SAGE evaluation, the design was further modified to increase its resistance against algebraic attacks, resulting in a cipher that became the standard for 3GPP encryption algorithms UEA2 and UIA2. This adaptation was crucial for the security of mobile communications, as it ensured that data transmitted over 3G networks remained protected from sophisticated attacks. The transition from SNOW 2.0 to SNOW 3G was driven by the need to address related-key vulnerabilities, which had been found to exist in both versions. By enhancing the cipher's resistance to these attacks, the authors ensured that SNOW 3G could be deployed in real-world scenarios without compromising security. This version of the cipher played a pivotal role in the global shift towards mobile communication, providing a secure foundation for the rapid expansion of 3G networks.

Common questions

Who designed the SNOW stream cipher family?

Thomas Johansson and Patrik Ekdahl designed the SNOW stream cipher family at Lund University in the late 1990s.

When was SNOW 1.0 excluded from the NESSIE project?

SNOW 1.0 was excluded from the NESSIE project after weaknesses were discovered during the rigorous evaluation process.

What is the output size of SNOW-V per iteration?

SNOW-V generates 128 bits of output per iteration using a shift register of 32 16-bit words.

Which standard does SNOW 3G support for mobile communications?

SNOW 3G became the standard for 3GPP encryption algorithms UEA2 and UIA2 during the ETSI SAGE evaluation.

What ISO standard includes the SNOW family of stream ciphers?

The SNOW family was chosen for inclusion in the ISO/IEC standard ISO/IEC 18033-4 as a reference cipher.

See all questions about Snow →

In this section

Loading sources

All sources

 

The 5G Redesign

In 2019, the SNOW family underwent a radical transformation with the introduction of SNOW-V, a version designed to match the high-speed requirements of 5G cellular networks. This extensive redesign increased the output to 128 bits per iteration, a significant leap from the 32-bit output of earlier versions. The new design utilized a shift register of 32 16-bit words, which could be implemented as four 128-bit SIMD registers, allowing for parallel processing of eight LFSR iterations. This innovation enabled the cipher to generate 128 bits of output in a single step, making it ideal for the high-speed demands of modern communication systems. The development of SNOW-Vi, a tweaked version of SNOW-V, further enhanced performance by making small changes to the LFSR while maintaining the same output transformation. This evolution demonstrated the ongoing commitment of the authors to adapt their designs to the changing landscape of technology, ensuring that SNOW remained relevant in an era of increasing data throughput.

The Global Standard

SNOW's influence extended beyond its initial development, as it became a reference cipher for the ESTREAM project and was chosen for inclusion in the ISO/IEC standard ISO/IEC 18033-4. This recognition highlighted the cipher's versatility and reliability, as it was used to evaluate the performance of other stream ciphers. The adoption of SNOW 2.0 and SNOW 3G by international standards bodies underscored the importance of the design in the global cryptographic community. The cipher's ability to function efficiently on both software and hardware platforms made it a preferred choice for a wide range of applications, from mobile communications to secure data transmission. The widespread use of SNOW in various standards demonstrated the authors' success in creating a cipher that could meet the diverse needs of the modern digital world. This global adoption also reflected the collaborative nature of cryptographic research, where the work of a few individuals could have a profound impact on the security of global communications.