首页> 外文会议>International Workshop on Fast Software Encryption >How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms
【24h】

How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms

机译:如何增强3GPP机密性和完整性算法的安全性

获取原文

摘要

We consider the 3GPP confidentiality and integrity schemes that were adopted by Universal Mobile Telecommunication System, an emerging standard for third generation wireless communications. The schemes, known as f8 and f9, are based on the block cipher KASUMI. Although previous works claim security proofs for f8 and f9′, where f9′ is a generalized version of f9, it was shown that these proofs are incorrect; it is impossible to prove f8 and f9′ secure under the standard PRP assumption on the underlying block cipher. Following the results, it was shown that it is possible to prove f8′ and f9′ secure if we make the assumption that the underlying block cipher is a secure PRP-RKA against a certain class of related-key attacks; here f8′ is a generalized version of f8. Needless to say, the assumptions here are stronger than the standard PRP assumptions, and it is natural to seek a practical way to modify f8′ and f9′ to establish security proofs under the standard PRP assumption. In this paper, we propose f8~+ and f9~+, slightly modified versions of f8′ and f9′, but they allow proofs of security under the standard PRP assumption. Our results are practical in the sense that we insist on the minimal modifications; f8~+ is obtained from f8′ by setting the key modifier to all-zero, and f9~+ is obtained from f9′ by setting the key modifier to all-zero, and using the encryptions of two constants in the CBC MAC computation.
机译:我们考虑了通用移动电信系统采用的3GPP机密性和完整性方案,是第三代无线通信的新兴标准。该方案称为F8和F9,基于块密码Kasumi。虽然以前的作品要求F8和F9'的安全证明,但F9'是F9的广义版本,结果表明这些证明是不正确的;在底层块密码上的标准PRP假设下,不可能证明F8和F9'安全。结果,如果假设底层块密码是针对某类相关关键攻击的安全PRP-RKA,则可以证明可以证明F8'和F9'安全。这里F8'是F8的广义版本。毋庸置疑,这里的假设比标准的PRP假设更强大,而且很自然地寻求修改F8'和F9'的实用方法来建立标准PRP假设下的安全证明。在本文中,我们提出了F8〜+和F9〜+,F8'和F9'的略微修改版本,但它们允许在标准PRP假设下安全证明。我们的结果在我们坚持最低修改的情况下是实用的;通过将键修改器设置为全零点来从F8'获得F8〜+,通过将键修改器设置为全零,并使用CBC MAC计算中的两个常数的加密来获得F9〜+。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号