A Comprehensive Security Analysis of the TUAK Algorithm Set

نویسندگان

  • Kalikinkar Mandal
  • Yin Tan
  • Teng Wu
  • Guang Gong
چکیده

The authentication and key generation functions play a significant role to guarantee security and privacy in cellular mobile communications. MILENAGE is a set of authentication and key generation functions proposed by the 3 Generation Partnership Project (3GPP). Most recently, the 3GPP Task Force proposed a new set of authentication and key generation functions, called TUAK, as an alternative for the 4G LTE cellular mobile communications. The design of the TUAK functions makes use of the Keccak permutation, which is a core function in the SHA-3 hash function. One may expect that the TUAK functions may inherit attack resistance properties from that of the Keccak permutation. However, TUAK functions are obtained by assigning keys, different constants and padding bits at different input positions of the Keccak permutation. Therefore, a security analysis for the construction of the TUAK functions is needed. In this paper, for the first time, we present a comprehensive security analysis of the TUAK function set. Our main contribution is to provide a security analysis of TUAK’s authentication and key derivation functions under various relevant cryptanalytic attacks. We consider powerful cryptanalytic attacks including differential attack, linear attack, distinguishing attack, boomerang attack and key-recovery attacks such as algebraic attacks and cube attacks. We conduct an experiment to find collisions on f2 and f5 functions and our experiment finds collisions on f2 function and near-collision on f5 function, due to the small output sizes. Our security analysis shows that the TUAK functions are resistant to the cryptanalytic attacks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Message Authentication in 4G LTE System

After decades of evolution, the cellular system has become an indispensable part of modern life. Together with the convenience brought by the cellular system, many security issues have arisen. Message integrity protection is one of the urgent problems. The integrity of a message is usually protected by message authentication code (MAC). Forgery attacks are the primary threat to message integrit...

متن کامل

A particle swarm optimization algorithm for minimization analysis of cost-sensitive attack graphs

To prevent an exploit, the security analyst must implement a suitable countermeasure. In this paper, we consider cost-sensitive attack graphs (CAGs) for network vulnerability analysis. In these attack graphs, a weight is assigned to each countermeasure to represent the cost of its implementation. There may be multiple countermeasures with different weights for preventing a single exploit. Also,...

متن کامل

A Cryptographic Analysis of the 3GPP AKA Protocol

Secure communications between mobile subscribers and their associated operator networks require mutual authentication and key derivation protocols. The 3GPP standard provides the AKA protocol for just this purpose. Its structure is generic, to be instantiated with a set of seven cryptographic algorithms. The currently-used proposal instantiates these by means of a set of AES-based algorithms ca...

متن کامل

A Cryptographic Analysis of UMTS/LTE AKA

Secure communications between mobile subscribers and their associated operator networks require mutual authentication and key derivation protocols. The 3GPP standard provides the AKA protocol for just this purpose. Its structure is generic, to be instantiated with a set of seven cryptographic algorithms. The currently-used proposal instantiates these by means of a set of AES-based algorithms ca...

متن کامل

Network Planning Using Iterative Improvement Methods and Heuristic Techniques

The problem of minimum-cost expansion of power transmission network is formulated as a genetic algorithm with the cost of new lines and security constraints and Kirchhoff’s Law at each bus bar included. A genetic algorithm (GA) is a search or optimization algorithm based on the mechanics of natural selection and genetics. An applied example is presented. The results from a set of tests carried ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015