New security proofs for the 3GPP confidentiality and integrity algorithms

被引:0
|
作者
Iwata, T
Kohno, T
机构
[1] Ibaraki Univ, Dept Comp & Informat Sci, Hitachi, Ibaraki 3168511, Japan
[2] Univ Calif San Diego, Dept Comp Sci & Engn, La Jolla, CA 92093 USA
来源
FAST SOFTWARE ENCRYPTION | 2004年 / 3017卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
This paper analyses the 3GPP confidentiality and integrity schemes adopted by Universal Mobile Telecommunication System, an emerging standard for third generation wireless communications. The schemes, known as f8 and f9, are based on the block cipher KASUMI. Although previous works claim security proofs for f8 and f9', where f9' is a generalized versions of f 9, it was recently shown that these proofs are incorrect. Moreover, Iwata and Kurosawa (2003) showed that it is impossible to prove f 8 and f9' secure under the standard PRP assumption on the underlying block cipher. We address this issue here, showing that it is possible to prove f8' and f9' secure if we make the assumption that the underlying block cipher is a secure PRP-RKA against a certain class of related-key attacks; here f8' is a generalized version of f8. Our results clarify the assumptions necessary in order for f8 and f9 to be secure and, since no related-key attacks are known against the full eight rounds of KASUMI, lead us to believe that the confidentiality and integrity mechanisms used in real 3GPP applications are secure.
引用
收藏
页码:427 / 445
页数:19
相关论文
共 50 条
  • [31] Enhancing security and privacy in 3GPP E-UTRAN radio interface
    Forsberg, Dan
    Leping, Huang
    Tsuyoshi, Kashima
    Alanara, Seppo
    2007 IEEE 18TH INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, VOLS 1-9, 2007, : 2299 - +
  • [32] New Key Escrow Model for The Lawful Interception in 3GPP
    Han, Kyusuk
    Yeun, Chan Yeob
    Kim, Kwangjo
    2009 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, 2009, : 355 - 356
  • [33] Network Access Security in Next-Generation 3GPP Systems: A Tutorial
    Sankaran, C. B.
    IEEE COMMUNICATIONS MAGAZINE, 2009, 47 (02) : 84 - 91
  • [34] Security for IP multimedia services in the 3GPP third generation mobile system
    Horn, G
    Kröselberg, D
    Müller, K
    INTERNET RESEARCH-ELECTRONIC NETWORKING APPLICATIONS AND POLICY, 2003, 13 (02): : 100 - 106
  • [35] Two protocols for improving security during the authentication and key in the 3GPP networks
    Modiri, M. M.
    Salmasizadeh, M.
    Mohajeri, J.
    Khalaj, B. H.
    COMPUTER COMMUNICATIONS, 2023, 211 : 286 - 301
  • [36] AN OVERVIEW OF 3GPP POSITIONING STANDARDS
    Yang, Chao
    Mao, Shiwen
    Wang, Xuyu
    GETMOBILE-MOBILE COMPUTING & COMMUNICATIONS REVIEW, 2022, 26 (01) : 9 - 13
  • [37] Sip signalling delay in 3GPP
    Kist, AA
    Harris, RJ
    CONVERGED NETWORKING: DATA AND REAL-TIME COMMUNICATIONS OVER IP, 2003, 119 : 211 - 222
  • [38] An Evolved 3GPP QoS Concept
    Ludwig, Reiner
    Ekstrom, Hannes
    Willars, Per
    Lundin, Niklas
    2006 IEEE 63RD VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 388 - 392
  • [39] 3GPP LTE: The Relevance of Interworking
    Oshin, Oluwadamilola I.
    Ndujiuba, Charles U.
    Idachaba, Francis E.
    WORLD CONGRESS ON ENGINEERING, WCE 2015, VOL I, 2015, : 638 - 640
  • [40] Machine Type Communications in 3GPP
    Kunz, Andreas
    Kim, LaeYoung
    Kim, Hyunsook
    Husain, Syed S.
    2012 IEEE GLOBECOM WORKSHOPS (GC WKSHPS), 2012, : 1747 - 1752