Specification of the Stream Cipher WG-16 Based Confidentiality and Integrity Algorithms

نویسندگان

  • Xinxin Fan
  • Guang Gong
چکیده

The fourth generation of mobile telecommunications system (marketed as 4G-LTE) is being commercially deployed. Security mechanisms are crucial to protect communications of mobile users from potential malicious attacks as well as to ensure revenue for 4G-LTE network operators. The randomness properties of the keystream generated by the current cipher suites in 4G-LTE standard are difficult to analyze and some vulnerabilities in regard to the integrity algorithms have been recently discovered. To address those issues, this technical report gives a detailed specification of a bit-oriented stream cipher WG-16 as well as the corresponding confidentiality and integrity algorithms that can be employed to secure the emerging 4G-LTE networks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Block and Stream Cipher Based Cryptographic Algorithms: A Survey

The encryption algorithms are designed to provide integrity and confidentiality of the messages. Modern cryptosystems are classified into three categories such as Block ciphers, Stream cipher and Hybrid ciphers of Hummingbird. This paper details about various types of block ciphers and stream ciphers. In this paper we also present the hybrid model of hummingbird and its comparison among other c...

متن کامل

Analysis of Stream Cipher Based Authenticated Encryption Schemes

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric...

متن کامل

Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers

In this paper we investigate univariate algebraic attacks on filter generators over extension fields Fq = F2n with focus on the WelchGong (WG) family of stream ciphers. Our main contribution is to break WG-5, WG-7, WG-8 and WG-16 by combining results on the so-called spectral immunity (minimum distance of certain cyclic codes) with properties of the WG type stream cipher construction. The spect...

متن کامل

Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+)

The stream cipher SNOW 3G designed in 2006 by ETSI/SAGE is a base algorithm for the second set of 3GPP confidentiality and integrity algorithms. In this paper we study the resynchronization mechanism of SNOW 3G and of a similar cipher SNOW 3G⊕ using multiset collision attacks. For SNOW 3G we show a simple 13-round multiset distinguisher with complexity of 2 steps. We show full key recovery chos...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013