A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
From MaRDI portal
Publication:3582766
DOI10.1007/978-3-642-14623-7_21zbMath1283.94064OpenAlexW1563341929MaRDI QIDQ3582766
Orr Dunkelman, Nathan Keller, Adi Shamir
Publication date: 24 August 2010
Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_21
Related Items
Practical Attack on the Full MMB Block Cipher, Improved (related-key) differential cryptanalysis on GIFT, PRINCEv2. More security for (almost) no overhead, Key guessing strategies for linear key-schedule algorithms in rectangle attacks, Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT, Truncated boomerang attacks and application to AES-based ciphers, A quantum related-key attack based on the Bernstein-Vazirani algorithm, Generalized boomerang connectivity table and improved cryptanalysis of GIFT, Optimizing rectangle attacks: a unified and generic framework for key recovery, Investigations on \(c\)-boomerang uniformity and perfect nonlinearity, Practical-time attacks against reduced variants of~MISTY1, LBlock: A Lightweight Block Cipher, On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model, On the boomerang uniformity of quadratic permutations, Hash Functions from Defective Ideal Ciphers, On Related-Key Attacks and KASUMI: The Case of A5/3, Improved BV-based quantum attack on block ciphers, Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo
Uses Software