New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms

نویسندگان

  • Tetsu Iwata
  • Tadayoshi Kohno
چکیده

This paper analyses the 3GPP confidentiality and integrity schemes adopted by UniversalMobile Telecommunication System, an emerging standard for third generation wireless commu-nications. The schemes, known as f8 and f9, are based on the block cipher KASUMI. Althoughprevious works claim security proofs for f8 and f9′, where f9′ is a generalized versions of f9,it was recently shown that these proofs are incorrect. Moreover, Iwata and Kurosawa (2003)showed that it is impossible to prove f8 and f9′ secure under the standard PRP assumptionon the underlying block cipher. We address this issue here, showing that it is possible to provef8′ and f9′ secure if we make the assumption that the underlying block cipher is a securePRP-RKA against a certain class of related-key attacks; here f8′ is a generalized version of f8.Our results clarify the assumptions necessary in order for f8 and f9 to be secure and, since norelated-key attacks are known against the full eight rounds of KASUMI, lead us to believe thatthe confidentiality and integrity mechanisms used in real 3GPP applications are secure.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms

We consider the 3GPP confidentiality and integrity schemes that were adopted by Universal Mobile Telecommunication System, an emerging standard for third generation wireless communications. The schemes, known as f8 and f9, are based on the block cipher KASUMI. Although previous works claim security proofs for f8 and f9′, where f9′ is a generalized version of f9, it was shown that these proofs a...

متن کامل

3GPP KASUMI Evaluation Report : 3rd Generation Partnership Project; Security Algorithms Group of Experts (SAGE); Report on the Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms (SAGE version 2.0)

The present document has been developed within the 3 rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP. The present document has not been subject to any approval process by the 3GPP Organizational Partners and shall not be implemented. This Specification is provided for future development work within 3GPP only. The Organizational Partners accept ...

متن کامل

Specification of the 3 GPP Confidentiality and Integrity Algorithms UEA 2 & UIA 2 . Document 5 : Design and Evaluation Report

No change to the technical content at all, just removal of an unwanted page header 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2.

متن کامل

Lightweight Security Solutions for LTE/LTE-A Networks. (Solutions de Sécurité Légers pour les Réseaux LTE/LTE-A)

Recently, the 3rd Group Project Partnership (3GPP) has developed Long Term Evolution/ Long Term Evolution-Advanced (LTE/LTE-A) systems which have been approved by the International Telecommunication Union (ITU) as 4th Generation (4G) mobile telecommunication networks. Security is one of critical issues which should be handled carefully to protect user’s and mobile operator’s information. Thus, ...

متن کامل

EPS Confidentiality and Integrity mechanisms Algorithmic Approach

The Long Term Evolution of UMTS is one of the latest steps in an advancing series of mobile telecommunications systems. Many articles have already been published on the LTE subject but these publications have viewed the subject from particular perspectives. In the present paper, a different approach has been taken. We are interested in the security features and the cryptographic algorithms used...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2004  شماره 

صفحات  -

تاریخ انتشار 2004