Specification of the Stream Cipher WG-16 Based Confidentiality and Integrity Algorithms
نویسندگان
چکیده
The fourth generation of mobile telecommunications system (marketed as 4G-LTE) is being commercially deployed. Security mechanisms are crucial to protect communications of mobile users from potential malicious attacks as well as to ensure revenue for 4G-LTE network operators. The randomness properties of the keystream generated by the current cipher suites in 4G-LTE standard are difficult to analyze and some vulnerabilities in regard to the integrity algorithms have been recently discovered. To address those issues, this technical report gives a detailed specification of a bit-oriented stream cipher WG-16 as well as the corresponding confidentiality and integrity algorithms that can be employed to secure the emerging 4G-LTE networks.
منابع مشابه
Block and Stream Cipher Based Cryptographic Algorithms: A Survey
The encryption algorithms are designed to provide integrity and confidentiality of the messages. Modern cryptosystems are classified into three categories such as Block ciphers, Stream cipher and Hybrid ciphers of Hummingbird. This paper details about various types of block ciphers and stream ciphers. In this paper we also present the hybrid model of hummingbird and its comparison among other c...
متن کاملAnalysis of Stream Cipher Based Authenticated Encryption Schemes
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. This approach is more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message, and in a separate pass providing integrity protection by generating a Message Authentication Code (MAC). AE using symmetric...
متن کاملA Hybrid Cryptographic algorithm design using Block and Stream cipher based Confidentiality and Integrity in Wireless Sensors Networks
متن کامل
Powers of Subfield Polynomials and Algebraic Attacks on Word-Based Stream Ciphers
In this paper we investigate univariate algebraic attacks on filter generators over extension fields Fq = F2n with focus on the WelchGong (WG) family of stream ciphers. Our main contribution is to break WG-5, WG-7, WG-8 and WG-16 by combining results on the so-called spectral immunity (minimum distance of certain cyclic codes) with properties of the WG type stream cipher construction. The spect...
متن کاملMultiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G (+)
The stream cipher SNOW 3G designed in 2006 by ETSI/SAGE is a base algorithm for the second set of 3GPP confidentiality and integrity algorithms. In this paper we study the resynchronization mechanism of SNOW 3G and of a similar cipher SNOW 3G⊕ using multiset collision attacks. For SNOW 3G we show a simple 13-round multiset distinguisher with complexity of 2 steps. We show full key recovery chos...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2013