How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms

نویسندگان

  • Tetsu Iwata
  • Kaoru Kurosawa
چکیده

We consider the 3GPP confidentiality and integrity schemes that were adopted by Universal Mobile Telecommunication System, an emerging standard for third generation wireless communications. The schemes, known as f8 and f9, are based on the block cipher KASUMI. Although previous works claim security proofs for f8 and f9′, where f9′ is a generalized version of f9, it was shown that these proofs are incorrect; it is impossible to prove f8 and f9′ secure under the standard PRP assumption on the underlying block cipher. Following the results, it was shown that it is possible to prove f8′ and f9′ secure if we make the assumption that the underlying block cipher is a secure PRP-RKA against a certain class of related-key attacks; here f8′ is a generalized version of f8. Needless to say, the assumptions here are stronger than the standard PRP assumptions, and it is natural to seek a practical way to modify f8′ and f9′ to establish security proofs under the standard PRP assumption. In this paper, we propose f8 and f9, slightly modified versions of f8′ and f9′, but they allow proofs of security under the standard PRP assumption. Our results are practical in the sense that we insist on the minimal modifications; f8 is obtained from f8′ by setting the key modifier to all-zero, and f9 is obtained from f9′ by setting the key modifier to all-zero, and using the encryptions of two constants in the CBC MAC computation.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

3GPP KASUMI Evaluation Report : 3rd Generation Partnership Project; Security Algorithms Group of Experts (SAGE); Report on the Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms (SAGE version 2.0)

The present document has been developed within the 3 rd Generation Partnership Project (3GPP TM) and may be further elaborated for the purposes of 3GPP. The present document has not been subject to any approval process by the 3GPP Organizational Partners and shall not be implemented. This Specification is provided for future development work within 3GPP only. The Organizational Partners accept ...

متن کامل

New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms

This paper analyses the 3GPP confidentiality and integrity schemes adopted by UniversalMobile Telecommunication System, an emerging standard for third generation wireless commu-nications. The schemes, known as f8 and f9, are based on the block cipher KASUMI. Althoughprevious works claim security proofs for f8 and f9′, where f9′ is a generalized versions of f9,it was recently sho...

متن کامل

Specification of the 3 GPP Confidentiality and Integrity Algorithms UEA 2 & UIA 2 . Document 5 : Design and Evaluation Report

No change to the technical content at all, just removal of an unwanted page header 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2.

متن کامل

EPS Confidentiality and Integrity mechanisms Algorithmic Approach

The Long Term Evolution of UMTS is one of the latest steps in an advancing series of mobile telecommunications systems. Many articles have already been published on the LTE subject but these publications have viewed the subject from particular perspectives. In the present paper, a different approach has been taken. We are interested in the security features and the cryptographic algorithms used...

متن کامل

Lightweight Security Solutions for LTE/LTE-A Networks. (Solutions de Sécurité Légers pour les Réseaux LTE/LTE-A)

Recently, the 3rd Group Project Partnership (3GPP) has developed Long Term Evolution/ Long Term Evolution-Advanced (LTE/LTE-A) systems which have been approved by the International Telecommunication Union (ITU) as 4th Generation (4G) mobile telecommunication networks. Security is one of critical issues which should be handled carefully to protect user’s and mobile operator’s information. Thus, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005