A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
From MaRDI portal
Publication:3582766
DOI10.1007/978-3-642-14623-7_21zbMath1283.94064OpenAlexW1563341929MaRDI QIDQ3582766
Orr Dunkelman, Nathan Keller, Adi Shamir
Publication date: 24 August 2010
Published in: Advances in Cryptology – CRYPTO 2010 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-14623-7_21
Related Items (18)
Practical Attack on the Full MMB Block Cipher ⋮ Improved (related-key) differential cryptanalysis on GIFT ⋮ PRINCEv2. More security for (almost) no overhead ⋮ Key guessing strategies for linear key-schedule algorithms in rectangle attacks ⋮ Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT ⋮ Truncated boomerang attacks and application to AES-based ciphers ⋮ A quantum related-key attack based on the Bernstein-Vazirani algorithm ⋮ Generalized boomerang connectivity table and improved cryptanalysis of GIFT ⋮ Optimizing rectangle attacks: a unified and generic framework for key recovery ⋮ Investigations on \(c\)-boomerang uniformity and perfect nonlinearity ⋮ Practical-time attacks against reduced variants of~MISTY1 ⋮ LBlock: A Lightweight Block Cipher ⋮ On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model ⋮ On the boomerang uniformity of quadratic permutations ⋮ Hash Functions from Defective Ideal Ciphers ⋮ On Related-Key Attacks and KASUMI: The Case of A5/3 ⋮ Improved BV-based quantum attack on block ciphers ⋮ Biclique cryptanalysis on lightweight block cipher: HIGHT and Piccolo
Uses Software
This page was built for publication: A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony