New security proofs for the 3GPP confidentiality and integrity algorithms

被引:0
|
作者
Iwata, T
Kohno, T
机构
[1] Ibaraki Univ, Dept Comp & Informat Sci, Hitachi, Ibaraki 3168511, Japan
[2] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
来源
FAST SOFTWARE ENCRYPTION | 2004年 / 3017卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper analyses the 3GPP confidentiality and integrity schemes adopted by Universal Mobile Telecommunication System, an emerging standard for third generation wireless communications. The schemes, known as f8 and f9, are based on the block cipher KASUMI. Although previous works claim security proofs for f8 and f9', where f9' is a generalized versions of f 9, it was recently shown that these proofs are incorrect. Moreover, Iwata and Kurosawa (2003) showed that it is impossible to prove f 8 and f9' secure under the standard PRP assumption on the underlying block cipher. We address this issue here, showing that it is possible to prove f8' and f9' secure if we make the assumption that the underlying block cipher is a secure PRP-RKA against a certain class of related-key attacks; here f8' is a generalized version of f8. Our results clarify the assumptions necessary in order for f8 and f9 to be secure and, since no related-key attacks are known against the full eight rounds of KASUMI, lead us to believe that the confidentiality and integrity mechanisms used in real 3GPP applications are secure.
引用
收藏
页码:427 / 445
页数:19
相关论文
共 50 条
  • [1] New security proofs for the 3GPP confidentiality and integrity algorithms
    Iwata, Tetsu
    Kohno, Tadayoshi
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2004, 3017 : 427 - 445
  • [2] On the correctness of security proofs for the 3GPP confidentiality and integrity algorithms
    Iwata, T
    Kurosawa, K
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2004, E87A (05) : 1110 - 1118
  • [3] On the correctness of security proofs for the 3GPP confidentiality and integrity algorithms
    Iwata, T
    Kurosawa, K
    CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2003, 2898 : 306 - 318
  • [4] How to enhance the security of the 3GPP confidentiality and integrity algorithms
    Iwata, T
    Kurosawa, K
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 268 - 283
  • [5] On the security of 3GPP networks
    Walker, M
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 102 - 103
  • [6] Research on 3GPP LTE Security Architecture
    Zhu, Li
    Qin, Hang
    Mao, Huaqing
    Hu, Zhiwen
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [7] New 3GPP Security Features in 5G Phase 1
    Kunz, Andreas
    Zhang, Xiaowei
    2018 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (IEEE CSCN), 2018,
  • [8] New 3GPP Standard for IoT
    Gozalvez, Javier
    IEEE VEHICULAR TECHNOLOGY MAGAZINE, 2016, 11 (01): : 14 - 20
  • [9] Overview of 5G Security in 3GPP
    Zhang, Xiaowei
    Kunz, Andreas
    Schroeder, Stefan
    2017 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), 2017, : 181 - 186
  • [10] Security from 3GPP IMS to TISPAN NGN
    Bultinck, A
    Hoefkens, D
    Mampaey, M
    ALCATEL TELECOMMUNICATIONS REVIEW, 2005, (04): : 303 - 308