메뉴 건너뛰기




Volumn 7118 LNCS, Issue , 2012, Pages 230-242

Analysis of the initial and modified versions of the candidate 3GPP integrity algorithm 128-EIA3

Author keywords

cryptanalysis; existential forgery attacks; message authentication codes; universal hashing

Indexed keywords

3GPP STANDARD; CRYPTANALYSIS; DESIGN FEATURES; FORGERY ATTACKS; INITIAL VECTORS; MESSAGE AUTHENTICATION CODES; UNIVERSAL HASHING;

EID: 84857758778     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-28496-0_14     Document Type: Conference Paper
Times cited : (8)

References (20)
  • 1
    • 84886147999 scopus 로고    scopus 로고
    • 3GPP Technical Specification Group Services and System Aspects: (Release 9). Tech. Rep. 3G TS 33.401 V 9.3.1, 3rd Generation Partnership Project (2010-04)
    • 3GPP Technical Specification Group Services and System Aspects: 3GPP System Architecture Evolution (SAE); Security architecture (Release 9). Tech. Rep. 3G TS 33.401 V 9.3.1, 3rd Generation Partnership Project (2010-04)
    • 3GPP System Architecture Evolution (SAE); Security Architecture
  • 2
    • 38149125785 scopus 로고    scopus 로고
    • The Power of Verification Queries in Message Authentication and Authenticated Encryption
    • Tech. Rep. 2004/309, ePrint Archive
    • Bellare, M., Goldreich, O., Mityagin, A.: The Power of Verification Queries in Message Authentication and Authenticated Encryption. Tech. Rep. 2004/309, Cryptology ePrint Archive (2004)
    • (2004) Cryptology
    • Bellare, M.1    Goldreich, O.2    Mityagin, A.3
  • 4
    • 77956179198 scopus 로고    scopus 로고
    • ETSI/SAGE: Document 1: UEA2 and UIA2 Specification. Version 2.1. Tech. rep., ETSI March 16
    • ETSI/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2. Document 1: UEA2 and UIA2 Specification. Version 2.1. Tech. rep., ETSI (March 16, 2009), http://www.gsmworld.com/documents/uea2- uia2-d1-v2-1.pdf
    • (2009) Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2
  • 8
    • 84857740683 scopus 로고    scopus 로고
    • ETSI/SAGE: Document 1: 128-EEA3 and 128-EIA3 Specification. Version 1.5. Tech. rep., ETSI January 4
    • ETSI/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 1: 128-EEA3 and 128-EIA3 Specification. Version 1.5. Tech. rep., ETSI (January 4, 2011), http://www.gsmworld.com/documents/EEA3-EIA3-specification-v1-5.pdf
    • (2011) Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3
  • 10
    • 84857740683 scopus 로고    scopus 로고
    • ETSI/SAGE: Document 4: Design and Evaluation Report. Version 1.3, Tech. rep., ETSI January 18
    • ETSI/SAGE: Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3. Document 4: Design and Evaluation Report. Version 1.3, Tech. rep., ETSI (January 18, 2011), http://www.gsmworld.com/ documents/EEA3-EIA3-Design-Evaluation-v1-3.pdf
    • (2011) Specification of the 3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3
  • 11
    • 51849140875 scopus 로고    scopus 로고
    • Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
    • Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
    • Handschuh, H., Preneel, B.: Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 144-161. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5157 , pp. 144-161
    • Handschuh, H.1    Preneel, B.2
  • 12
    • 84991939136 scopus 로고
    • LFSR-Based Hashing and Authentication
    • Desmedt, Y.G. (ed.) CRYPTO 1994. Springer, Heidelberg
    • Krawczyk, H.: LFSR-Based Hashing and Authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129-139. Springer, Heidelberg (1994)
    • (1994) LNCS , vol.839 , pp. 129-139
    • Krawczyk, H.1
  • 14
    • 84957645558 scopus 로고
    • Bucket Hashing and Its Application to Fast Message Authentication
    • Coppersmith, D. (ed.) CRYPTO 1995. Springer, Heidelberg
    • Rogaway, P.: Bucket Hashing and Its Application to Fast Message Authentication. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol. 963, pp. 29-42. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.963 , pp. 29-42
    • Rogaway, P.1
  • 15
    • 33746021717 scopus 로고    scopus 로고
    • Bucket Hashing and its Application to Fast Message Authentication
    • Rogaway, P.: Bucket Hashing and its Application to Fast Message Authentication. Journal of Cryptology 12(2), 91-115 (1999)
    • (1999) Journal of Cryptology , vol.12 , Issue.2 , pp. 91-115
    • Rogaway, P.1
  • 16
    • 84942520895 scopus 로고    scopus 로고
    • On Fast and Provably Secure Message Authentication Based on Universal Hashing
    • Koblitz, N. (ed.) CRYPTO 1996. Springer, Heidelberg
    • Shoup, V.: On Fast and Provably Secure Message Authentication Based on Universal Hashing. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 313-328. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1109 , pp. 313-328
    • Shoup, V.1
  • 17
    • 0000410707 scopus 로고
    • Universal Hashing and Authentication Codes
    • Stinson, D.: Universal Hashing and Authentication Codes. Design, Codes and Cryptography 4, 369-380 (1994)
    • (1994) Design, Codes and Cryptography , vol.4 , pp. 369-380
    • Stinson, D.1
  • 19
    • 0019572642 scopus 로고
    • New Hash Functions and Their Use in Authentication and Set Equality
    • Wegman, M., Carter, J.: New Hash Functions and Their Use in Authentication and Set Equality. Journal of Computer and System Science 22, 265-279 (1981)
    • (1981) Journal of Computer and System Science , vol.22 , pp. 265-279
    • Wegman, M.1    Carter, J.2
  • 20
    • 84889747727 scopus 로고    scopus 로고
    • Cryptanalysis of the Stream Cipher ZUC in the 3GPP Confidentiality & Integrity Algorithms 128-EEA3 & 128-EIA3
    • Presented at the
    • Wu, H.: Cryptanalysis of the Stream Cipher ZUC in the 3GPP Confidentiality & Integrity Algorithms 128-EEA3 & 128-EIA3. Presented at the ASIACRYPT 2010 rump session (2010), http://www.spms.ntu.edu.sg/ Asiacrypt2010/ Rump%20Session-%207%20Dec%202010/wu-rump-zuc.pdf
    • ASIACRYPT 2010 Rump Session (2010)
    • Wu, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.