2012
DOI: 10.1007/978-3-642-28496-0_14
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3

Abstract: In this paper we investigate the security of the two most recent versions of the message authentication code 128-EIA3, which is considered for adoption as a third integrity algorithm in the emerging 3GPP standard LTE. We first present an efficient existential forgery attack against the June 2010 version of the algorithm. This attack allows, given any message and the associated MAC value under an unknown integrity key and an initial vector, to predict the MAC value of a related message under the same key and th… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0
2

Year Published

2012
2012
2018
2018

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(7 citation statements)
references
References 9 publications
(4 reference statements)
0
4
0
2
Order By: Relevance
“…From Section 4 it is clear that X 0 , the output from the accumulation process for M 0 , is related to the value X for the accumulation of the original message M by the sliding relationship, so X 0 D OEx 1 ; x 2 ; : : : ; x d 1 ;˛. Since F also slides by one bit when a zero is appended to the message, the entire MAC has this property, as noted in [12]. The attacker need only guess one bit,˛, to form a valid MAC for M 0 .…”
Section: Security Analysis For Existing Ciphersmentioning
confidence: 94%
See 3 more Smart Citations
“…From Section 4 it is clear that X 0 , the output from the accumulation process for M 0 , is related to the value X for the accumulation of the original message M by the sliding relationship, so X 0 D OEx 1 ; x 2 ; : : : ; x d 1 ;˛. Since F also slides by one bit when a zero is appended to the message, the entire MAC has this property, as noted in [12]. The attacker need only guess one bit,˛, to form a valid MAC for M 0 .…”
Section: Security Analysis For Existing Ciphersmentioning
confidence: 94%
“…Therefore an attacker can provide a valid X 00 for M 00 lCi with probability 2 i , for 1 Ä i Ä d . This is the basis of the previously reported attack on 128-EIA3 version 1.4 [12].…”
Section: Security Considerations For the Accumulation Processmentioning
confidence: 98%
See 2 more Smart Citations
“…Génération de paramètres et de clésVoir[7] afin d'avoir les détails sur le fonctionnement des fonctions (f1, f2, f3, f3, f4).Confidentialité et intégrité de données :Une fois que l'authentification mutuelle et l'association sont établies, la confidentialité et l'intégrité de données sont assurées en utilisant les clés générés. Le LTE utilise un standard de confidentialité appelé Evolved Packet System Encryption Algorithm (128-EEA3) et un autre pour l'intégrité appelé Evolved Packet System Integrity Algorithm (128-EIA3)[60]. Les deux standards sont basés sur le flux de chiffrement SNOW 3G[5].…”
unclassified