Cryptanalysis of the cellular message encryption algorithm
David Wagner,Bruce Schneier,John Kelsey +2 more
- pp 526-537
Reads0
Chats0
TLDR
In this paper, the authors present an attack on CMEA which requires 40-80 known plaintexts, has time complexity about 224-232, and finishes in minutes or hours of computation on a standard workstation.Abstract:
This paper analyzes the Telecommunications Industry Association's Cellular Message Encryption Algorithm (CMEA), which is used for confidentiality of the control channel in the most recent American digital cellular telephony systems. We describe an attack on CMEA which requires 40–80 known plaintexts, has time complexity about 224–232, and finishes in minutes or hours of computation on a standard workstation. This demonstrates that CMEA is deeply flawed.read more
Citations
More filters
Journal ArticleDOI
Local Shannon entropy measure with statistical tests for image randomness
TL;DR: The proposed local Shannon entropy measure overcomes several weaknesses of the conventional global Shannon entropyMeasure, including unfair randomness comparisons between images of different sizes, failure to discern image randomness before and after image shuffling, and possible inaccurate scores for synthesized images.
Twofish : A 128-bit block cipher
TL;DR: The design of both the round function and the key schedule permits a wide variety of tradeoffs between speed, software size, key setup time, gate count, and memory.
Journal ArticleDOI
Wireless Network Security and Interworking
TL;DR: This paper provides a comprehensive discussion of security problems and current technologies in 3G and WLAN systems, and provides introductory discussions about the security problems in interworking, the state-of-the-art solutions, and open problems.
Book ChapterDOI
On the Construction of Variable-Input-Length Ciphers
Mihir Bellare,Phillip Rogaway +1 more
TL;DR: The VIL mode of operation makes a variable-input-length cipher from any block cipher, and is demonstrably secure in the provable-security sense of modern cryptography: it is given a quantitative security analysis relating the difficulty of breaking the constructed (variable- input-length) cipher to the difficultyof breaking the underlying block cipher.
Journal ArticleDOI
Cryptography Is Harder than It Looks
TL;DR: Getting security right is harder than it looks, and the best chance is to make the cryptography as simple and public as possible.
References
More filters
Journal ArticleDOI
Decrypting the puzzle palace
TL;DR: It seems a highly opportune time, directly following the authors' dis-orienting victory in the Cold War, to ask if the threats from which the NSA purportedly protect us are as significant as the hazards its activities present.