The Internet Archive has a preservation copy of this work in our general collections.
The file type is application/pdf
.
Computational Security Analysis of the UMTS and LTE Authentication and Key Agreement Protocols
[article]
2013
arXiv
pre-print
We present a computational security analysis of the Authentication and Key Agreement (AKA) protocols for both Long-Term Evolution (LTE) and Universal Mobile Telecommunications System (UMTS). This work constitutes the first security analysis of LTE AKA to date and the first computationally sound analysis of UMTS AKA. Our work is the first formal analysis to consider messages that are sent in the core network, where we take into account details of the carrying protocol (i.e., MAP or Diameter) and
arXiv:1203.3866v2
fatcat:4p6lujccvjesbaznxtyx5vvu2q