A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
From MaRDI portal
Publication:484333
DOI10.1007/S00145-013-9154-9zbMATH Open1301.94113OpenAlexW1965570021MaRDI QIDQ484333FDOQ484333
Authors: Orr Dunkelman, Nathan Keller, Adi Shamir
Publication date: 7 January 2015
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-013-9154-9
Recommendations
Cites Work
- New block encryption algorithm MISTY
- Perfect nonlinear S-boxes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- New types of cryptanalytic attacks using related keys
- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
- Practical attack on the full MMB block cipher
- Title not available (Why is that?)
- Title not available (Why is that?)
- Related-Key Cryptanalysis of the Full AES-192 and AES-256
- Another attack on A5/1
- Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis
- The Return of the Cryptographic Boomerang
- Information Security and Privacy
- Related-Key Boomerang and Rectangle Attacks
- Conditional Estimators: An Effective Attack on A5/1
- Advances in Cryptology - CRYPTO 2003
- Advances in Cryptology - CRYPTO 2003
- A Related-Key Rectangle Attack on the Full KASUMI
- Fast Software Encryption
Cited In (24)
- Investigations on \(c\)-boomerang uniformity and perfect nonlinearity
- Related-key analysis of generalized Feistel networks with expanding round functions
- A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
- On related-key attacks and KASUMI: the case of A5/3
- Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
- Mind the \texttt{TWEAKEY} schedule: cryptanalysis on \texttt{SKINNYe-64-256}
- PRINCEv2. More security for (almost) no overhead
- Improved cryptanalysis of the block cipher KASUMI
- Provable related-key security of contracting Feistel networks
- Strong continuous non-malleable encoding schemes with tamper-detection
- Optimizing rectangle attacks: a unified and generic framework for key recovery
- The retracing boomerang attack, with application to reduced-round AES
- Related-key almost universal hash functions: definitions, constructions and applications
- Correlation power analysis on KASUMI: attack and countermeasure
- Quantum boomerang attacks and some applications
- Another look at differential-linear attacks
- Title not available (Why is that?)
- Key guessing strategies for linear key-schedule algorithms in rectangle attacks
- The retracing boomerang attack
- Efficient detection of high probability statistical properties of cryptosystems via surrogate differentiation
- Probabilistic extensions: a one-step framework for finding rectangle attacks and beyond
- A Related-Key Rectangle Attack on the Full KASUMI
- Revisiting differential-linear attacks via a boomerang perspective with application to AES, Ascon, CLEFIA, SKINNY, PRESENT, KNOT, TWINE, WARP, LBlock, Simeck, and SERPENT
- Optimizing rectangle and boomerang attacks: a unified and generic framework for key recovery
Uses Software
This page was built for publication: A practical-time related-key attack on the \texttt{KASUMI} cryptosystem used in GSM and 3G telephony
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q484333)