Behavioral Modification in Cellular Message Encryption Algorithm

نویسندگان

  • Pawan Pandey
  • Ajay Rana
چکیده

This paper, first we describe the introduction of Cellular Message Encryption Algorithm, used for control channel encryption in Cellular Telephony scheme. Secondly why this algorithm is weak against security of cipher text being transmitted and finally how we can modify the Cellular Message Encryption Algorithm to be more secure for control data transmission.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Modified Cellular Message Encryption Algorithm

This paper analyzes the Modified Cellular Message Encryption Algorithm (M-CMEA) which is an enhanced version of the Telecommunication Industry Association’s Cellular Message Encryption Algorithm. We analyzed more properties to, “Why is CMEA weak?” and modification required to secure the CMEA.

متن کامل

Cryptanalysis of the Improved Cellular Message Encryption Algorithm

This paper analyzes the Improved Cellular Message Encryption Algorithm (CMEA-I) which is an improved version of the Telecommunication Industry Association’s Cellular Message Encryption Algorithm (CMEA). We present a chosen-plaintext attack of CMEA-I which requires less than 850 plaintexts in its adaptive version. This demonstrates that the improvements made over CMEA are ineffective to thwart s...

متن کامل

An Adaptive Chosen-plaintext Attack of the Improved Cellular Message Encryption Algorithm

This paper analyzes the Improved Cellular Message Encryption Algorithm (CMEA-I) which is an improved version of the Telecommunication Industry Association’s Cellular Message Encryption Algorithm (CMEA). We present a chosen-plaintext attack of CMEA-I which requires less than 850 plaintexts in its adaptive version. This demonstrates that the improvements made over CMEA are ineffective to thwart s...

متن کامل

ارائه روشی برای رمزنگاری تصاویر با استفاده از اتوماتای سلولی ترکیبی

In this paper, a new structure for image encryption using hybrid cellular automata is presented. The image encryption is done in two steps. At the first step, each pixel is encrypted by rules of hybrid cellular automata. In the next step, each pixel converted to a binary number and each bit is encrypted by rules of cellular automata. The rules are made by a function. Due to reversibility of cel...

متن کامل

Cryptanalysis of the Cellular Message Encryption Algorithm

This paper analyzes the Telecommunications Industry Association’s Cellular Message Encryption Algorithm (CMEA), which is used for confidentiality of the control channel in the most recent American digital cellular telephony systems. We describe an attack on CMEA which requires 40–80 known plaintexts, has time complexity about 2–2, and finishes in minutes or hours of computation on a standard wo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013