Filters








48 Hits in 4.5 sec

On Related-Key Attacks and KASUMI: The Case of A5/3 [chapter]

Phuong Ha Nguyen, Matthew J. B. Robshaw, Huaxiong Wang
2011 Lecture Notes in Computer Science  
Robshaw, Huaxiong Wang On related-key attacks and KASUMI: the case of A5/3 On related-key attacks and KASUMI: the case of A5/3 Motivation 64-bit key version of Kasumi used for A5/3 Upper bound for any  ...  Robshaw, Huaxiong Wang On related-key attacks and KASUMI: the case of A5/3 Phuong Ha Nguyen, M.J.B. Robshaw, Huaxiong Wang On related-key attacks and KASUMI: the case of A5/3  ... 
doi:10.1007/978-3-642-25578-6_12 fatcat:d5vybtk24bajbh5rgkyarej4qa

A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony

Orr Dunkelman, Nathan Keller, Adi Shamir
2013 Journal of Cryptology  
The existence of better related-key attacks on the full KASUMI was already shown in [8, 21] .  ...  They will soon be replaced by the new A5/3 (and the soon to be announced A5/4) algorithm based on the block cipher KASUMI, which is a modified version of MISTY.  ...  However, the new attack uses both related keys and chosen messages, and thus it might not be applicable to the specific way in which KASUMI is used as the A5/3 encryption algorithm in third generation  ... 
doi:10.1007/s00145-013-9154-9 fatcat:frtnebudwbgspclghn7i7cwkka

A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony [chapter]

Orr Dunkelman, Nathan Keller, Adi Shamir
2010 Lecture Notes in Computer Science  
They are being replaced now by the new A5/3 and A5/4 algorithms, which are based on the block cipher KASUMI.  ...  By using this distinguisher and analyzing the single remaining round, we can derive the complete 128-bit key of the full KASUMI with a related-key attack which uses only 4 related keys, 2 26 data, 2 30  ...  For the two pairs (C a , C c ) and (C b , C d ) use the value of the guessed key to compute the input and output differences of the OR operation in the last round of both pairs.  ... 
doi:10.1007/978-3-642-14623-7_21 fatcat:hfbci6i2uvdq5hcxbhuklsipca

Design hybrid encryption system based on E0 algorithm and A5/3 algorithm in the encryption process

2018 Al-Qadisiyah Journal Of Pure Science  
Key word: Simulation, E0, A5/3 algorithms, hybrid, SIMULINK.,kasumi Physical Classification QA75. -76.95 .  ...  The purpose of this paper is to create the safer hybrid system ,the more secure and fast , by the merge A5/3 algorithm with E0 algorithm, so as to produce bluetooth algorithm relies on block cipher.  ...  In the Figure ( 3) shows the simulation of A5/3 algorithm using SIMULINK , and we note that the input to the A5/3 algorithm depends on two of the subsystem blokes, the first subsystem block is relating  ... 
doi:10.29350/jops.2018.23.2.764 fatcat:t3e7byb5h5evxffbfbcgyjlv4u

Differential Fault Attack on KASUMI Cipher Used in GSM Telephony

Zongyue Wang, Xiaoyang Dong, Keting Jia, Jingyuan Zhao
2014 Mathematical Problems in Engineering  
As an algorithm in this family survived from cryptanalysis, A5/3 is based on the block cipher KASUMI. This paper describes a novel differential fault attack on KAUSMI with a 64-bit key.  ...  Taking advantage of some mathematical observations on the FL, FO functions, and key schedule, only one 16-bit word fault is required to recover all information of the 64-bit key.  ...  We denote KASUMI with 64-bit key by KASUMI-64 and A5/3 with 64bit session key by A5/3-64, respectively.  ... 
doi:10.1155/2014/251853 fatcat:f7phlslhkfa6fmg5l75za5qz7y

Multidimensional Zero-Correlation Linear Cryptanalysis of the Block Cipher KASUMI [article]

Wentan Yi, Shaozhen Chen
2014 arXiv   pre-print
Moreover, zero-correlation linear attacks on the last 7-round KASUMI are also introduced under some weak keys conditions. These weak keys take 2^-14 of the whole key space.  ...  For the attack under weak keys conditions on the last 7 round, the data complexity is about 2^62.1 known plaintexts and the time complexity 2^110.5 encryptions.  ...  In the related-key setting, Blunden et al. [6] gave a related-key differential attack on 6-round KASUMI. Using related-key booming and rectangle attack, Biham et al.  ... 
arXiv:1404.6100v4 fatcat:mi4u2oyr3jdx3mhuoxmk6y7zgy

KAMIES: Security Optimization of KASUMI Algorithm by Increasing Diffusion Level

Muhammad Salman, Rizki Yugitama, Amiruddin ., Riri Fitri Sari
2018 International Journal of Security and Its Applications  
This is based on the results of SAC and AWD testing on KASUMI and KAMIES algorithm. The result showed that KAMIES algorithm has a better diffusion level than KASUMI algorithm.  ...  The results obtained from this study showed that the application of F Function of MISTY1 and S-Box of AES has an influence on the increase of the security level of KASUMI algorithm.  ...  KASUMI KASUMI [2] is a type of block cipher encryption algorithm and a variance of MISTY1 which was developed by Security Algorithms Group of Experts (SAGE) as the basic A5/3 algorithm used for GSM-based  ... 
doi:10.14257/ijsia.2018.12.3.04 fatcat:b32zw2dwmve3fi2kfkmjkum7xe

Application of FSM Machine and S-Box in KASUMI Block Cipher to Improve Its Resistance Against Attack

Raja Muthalagu, Subeen Jain
2018 International Journal of Network Security  
Also, few changes are made in a KI and KL keys that are used in a different rounds of KASUMI to prevent various attacks such as a rectangle attack, sandwich attack, single key attack, etc.  ...  The addition of FSM in KASUMI is introducing the non-linearity in output bits and it will increase the complexity for an attacker to make an attack.  ...  In GSM, KA-SUMI is used in the A5/3 key stream generator and in GPRS in the GEA3 key stream generator.  ... 
dblp:journals/ijnsec/MuthalaguJ18 fatcat:3mrgrbftnndtberhhkrpidpmca

Reducing the time required by KASUMI to generate output by modifying the FL and FI functions

Raja Muthalagu, Subeen Jain
2018 Iran Journal of Computer Science  
In addition, the FI function uses S7 and S9 tables only one time instead of two times in the existing KASUMI block cipher, which leads to reduce the overall time delay.  ...  Also, we proposed a modification in FL functions: FL(a) and FL(b) of the existing KASUMI block cipher.  ...  Some of the modifications were also proposed to optimize the functioning of KASUMI [8] . In 2014, Wang et al. DFA attacked KASUMI-64, which is the base of the A5/3 cryptosystem.  ... 
doi:10.1007/s42044-018-0017-2 fatcat:s677n6ig7zaorftsbldwkmlk44

Development Communication Programs and Communications Security Capability by Improving the Cellular Networks Radio Layer

Sura Khalil Ibrahim, Zainab Taha Jebur
2020 Journal of Southwest Jiaotong University  
This presentation provides an overview of the objectives and concomitant impacts of these projects on the overall security of mobile networks.  ...  The topic of mobile security is vast as it includes radio access, network infrastructure, terminals, as well as the applications running on it. This article focuses on the first two themes.  ...  Very realistic attacks against A5/2 have been reported. The algorithms A5/3 [7] and A5/4 [8] are derived from the Kasumi algorithm used in 3G.  ... 
doi:10.35741/issn.0258-2724.55.3.39 fatcat:abkr73blcfhsxbxlqqudui4lxm

A Proposed Lower Computational Complexity Secret Key Mirroring System on GSM

Oyinloye OE, Alese BK, Thompson F, Adetunmbi AO
2017 Journal of computer science and systems biology  
These practical obstacles make actual implementation of the attack difficult. Dunkelman et al. proposed a related key attack on Kasumi used in A5/3 to recover the key from block cipher [17] .  ...  The study obtained the 128-bit key using chosen and related messages that may not be applicable in the specific way in which Kasumi is used on the A5/3 encryption in the 3G GSM telephony.  ... 
doi:10.4172/jcsb.1000239 fatcat:hsj7y2e27vayvf2htkbxrgekyq

ANALYSIS OF RC4 ENCRYPTION ALGORITHM

Elyorion Kurbonov
2019 Bulletin of the Novosibirsk Computing Center Series Computer Science  
The most important and cryptographically significant goal of a stream cipher is to produce a pseudorandom sequence of bits or words using a fixed length secret key, often paired with a fixed length public  ...  Over the last three decades of research and development in stream ciphers, a number of designs have been proposed and analyzed by the cryptology community.  ...  Using the technique of related key attacks on RC4, this scheme has been broken through passive full-key recovery attacks, and thus WEP is considered insecure in practice.  ... 
doi:10.31144/bncc.cs.2542-1972.2019.n43.p53-60 fatcat:qnv7twhmwnczdjevlhksgznjru

A Review of Security Attacks on the GSM Standard [chapter]

Giuseppe Cattaneo, Giancarlo Maio, Pompeo Faruolo, Umberto Ferraro Petrillo
2013 Lecture Notes in Computer Science  
Most of these attacks focuses on the A5/1 algorithm used to protect over-the-air communication between the two parties of a phone call.  ...  The objective of this work is to review some of the most relevant results in this field and discuss their practical feasibility.  ...  Finally, the A5/3 algorithm was developed in 1997 and is based on the MISTY cipher [12] .  ... 
doi:10.1007/978-3-642-36818-9_58 fatcat:p5wqmf4glrcfhfm4peatrsjqcy

Providing End-To-End Secure Communications in GSM Networks

Heshem A.El Zouka
2015 International journal of network security and its applications  
Any attacker can have complete control over the communication channel, listen to phone calls, read email, and spy on whatever data has been sent via GSM mobile communication system.  ...  The broadcast nature of radio medium in GSM networks makes them more vulnerable to various attacks.  ...  A5/3 algorithm is based on the KASUMI algorithm that is specified in reference [12] .  ... 
doi:10.5121/ijnsa.2015.7402 fatcat:wkjq4xvzyvep3kuxfxfufo5y7q

Algorithm 959

José Antonio Álvarez-Cubero, Pedro J. Zufiria
2016 ACM Transactions on Mathematical Software  
very high nonlinearity, a key property for robustness against linear attacks. the robustness against attacks) of Boolean and vector Boolean functions.  ...  Finally, three real applications of the library are described: the first one analyzes the KASUMI block cipher, the second one analyzes the Mini-AES cipher, and the third one finds Boolean functions with  ...  Search for Vector Boolean Functions with Excellent Profiles Boolean functions with very high nonlinearity pose some of the most challenging problems in the area of symmetric cryptography and combinatorics  ... 
doi:10.1145/2794077 fatcat:4tgey4sslzbxjfly4t3sra6hc4
« Previous Showing results 1 — 15 out of 48 results