A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms
[chapter]
2005
Lecture Notes in Computer Science
We consider the 3GPP confidentiality and integrity schemes that were adopted by Universal Mobile Telecommunication System, an emerging standard for third generation wireless communications. The schemes, known as f 8 and f 9, are based on the block cipher KASUMI. Although previous works claim security proofs for f 8 and f 9 , where f 9 is a generalized version of f 9, it was shown that these proofs are incorrect; it is impossible to prove f 8 and f 9 secure under the standard PRP assumption on
doi:10.1007/11502760_18
fatcat:3v4gz4p7trfc3czhykn6c4rtaa