scispace - formally typeset
Open AccessBook ChapterDOI

Cryptanalysis of the cellular message encryption algorithm

Reads0
Chats0
TLDR
In this paper, the authors present an attack on CMEA which requires 40-80 known plaintexts, has time complexity about 224-232, and finishes in minutes or hours of computation on a standard workstation.
Abstract
This paper analyzes the Telecommunications Industry Association's Cellular Message Encryption Algorithm (CMEA), which is used for confidentiality of the control channel in the most recent American digital cellular telephony systems. We describe an attack on CMEA which requires 40–80 known plaintexts, has time complexity about 224–232, and finishes in minutes or hours of computation on a standard workstation. This demonstrates that CMEA is deeply flawed.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Local Shannon entropy measure with statistical tests for image randomness

TL;DR: The proposed local Shannon entropy measure overcomes several weaknesses of the conventional global Shannon entropyMeasure, including unfair randomness comparisons between images of different sizes, failure to discern image randomness before and after image shuffling, and possible inaccurate scores for synthesized images.

Twofish : A 128-bit block cipher

TL;DR: The design of both the round function and the key schedule permits a wide variety of tradeoffs between speed, software size, key setup time, gate count, and memory.
Journal ArticleDOI

Wireless Network Security and Interworking

TL;DR: This paper provides a comprehensive discussion of security problems and current technologies in 3G and WLAN systems, and provides introductory discussions about the security problems in interworking, the state-of-the-art solutions, and open problems.
Book ChapterDOI

On the Construction of Variable-Input-Length Ciphers

TL;DR: The VIL mode of operation makes a variable-input-length cipher from any block cipher, and is demonstrably secure in the provable-security sense of modern cryptography: it is given a quantitative security analysis relating the difficulty of breaking the constructed (variable- input-length) cipher to the difficultyof breaking the underlying block cipher.
Journal ArticleDOI

Cryptography Is Harder than It Looks

TL;DR: Getting security right is harder than it looks, and the best chance is to make the cryptography as simple and public as possible.
References
More filters
Journal ArticleDOI

Decrypting the puzzle palace

TL;DR: It seems a highly opportune time, directly following the authors' dis-orienting victory in the Cold War, to ask if the threats from which the NSA purportedly protect us are as significant as the hazards its activities present.