chapter 6. stream cipher design - uoacgi.di.uoa.gr/~halatsis/crypto/bibliografia/crypto...security...

41
@G. Gong, 2003 1 Chapter 6. Stream Cipher Design 1 Model for Secure Communications and Attacks 2 Shannon's Theory on Perfect Secrecy and Product Cryptosystems (self reading, Stinson’s book, or Chapters 1 and 2 in Stalling's book) 3 One-time-pad and Design Principles of Stream Ciphers 4 Addressed Problems in Wireless Security 5 Some Concerns in Multimedia Security and Low Cost Cryptography 6 Case Study: A5 stream cipher for GSM 7 Case Study: w7, an Analogue Cipher of A5 8 Correlation Attack to Stream Ciphers (self reading)

Upload: others

Post on 16-Mar-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 1

Chapter 6. Stream Cipher Design

1 Model for Secure Communications and Attacks2 Shannon's Theory on Perfect Secrecy and Product Cryptosystems (self

reading, Stinson’s book, or Chapters 1 and 2 in Stalling's book)3 One-time-pad and Design Principles of Stream Ciphers4 Addressed Problems in Wireless Security5 Some Concerns in Multimedia Security and Low Cost Cryptography6 Case Study: A5 stream cipher for GSM7 Case Study: w7, an Analogue Cipher of A58 Correlation Attack to Stream Ciphers (self reading)

Page 2: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 2

6.1. Model for Secure Communications

Three components of secure communications:

ØCommunication principles

ØTrusted third party (or authority)

Ø Opponents (attackers)

Page 3: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 3

Principal Principal

Message

Secretinformation

Security-relatedtransformation

Security-relatedtransformation

Message

Secret information

Information channel

Opponent

Trusted third party(i.e, arbiter, distributerof secret information)

Figure 1. Model for Secure Communications

Page 4: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

Insecure information channel

Sender Receiver

Attacker

Passive attacks

Interception (confidentiality, privacy)

Figure 2. Passive attacks

Page 5: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

Active attacks (authentication)

AttackerInterruption Modification Fabrication

Insecure information channel

ReceiverSender

Figure 3. Active attacks

Page 6: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 6

Shared key

Plaintext Encryptionalgorithm

Decryptionalgorithm

Ciphertext Plaintext

Figure 4. Simplified Model of Conventional Encryption

Page 7: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 7

Messagesource

mEncrypter Decrypter Destinationc

Cryptanalyst ck

Secure channelk

Keygenerator

Figure 5. Model of Conventional Cryptosystem

Page 8: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 8

6.3 One-time-pad and Design Principles of Stream Ciphers

A. Model of Steam CiphersB. One-time-pad C. Randomness Measurements for PRSG (Done in

Chapter 2-4)D. Known Key Generators for Stream Ciphers (done

in Chapter 5)

Page 9: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 9

Model of Stream Cipher

Messagesource

Keygeneration

K, seed

Cipherm = m1, m2, ...

k = k1, k2, ...

+c = c1 , c2, ...

Page 10: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 10

One-time-pad

One-time-pad means that different messages are encrypted by different key streams.

• Shannon's Result (1948): One-time-pad is unbreakable. Request for large period.

• Massey's Discovery (1969): If a binary sequence has linear span n then the entire sequence can be reconstructed from 2n consecutive known bits by the Berlekamp-Massey algorithm. Request for large linear span.

Page 11: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 11

• Large Linear Span

Randomness Measurements

Randomness Measurements for PSG:

• Long Period

• Balance Property

• Run Property

• n-tuple Distribution

• Two-level Auto Correlation and Low Cross Correlation

• Indistiguinishability: it cannot be distiguinished from a truly random sequence in terms of polynomial algorithm.

Page 12: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 12

• Shrinking Generators (Coppersmith-Krawczys-Mansour, 1993)

Known Key Generators for Stream Ciphers

• Linear Feedback Shift Registers(LFSR) (1948-1969)

• Filter Function Generators (Key: 1973)

• Combinatorial Function Generators (Groth: 1971)

• Clock Controlled Generators (Beth and Piper: 1984)

(All LFSR based nonlinear generators in chapter 5)

Page 13: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 13

6.4 Addressed Problems in Wireless Security

Ø

Security Algorithms used in GSM

Possible Interception Attacks in GSM

Possible Interception Attacks in IS-95 CDM

Security Issues in 3G Systems

Security Trends in 3G Systems

Security in 4G Systems

Page 14: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 14

Security Algorithms used in GSM

Page 15: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 15

Security Algorithms used in GSM (Cont.)

Ø Nearly every GSM operator in the world uses an algorithm called COMP128 for both A3 and A8 algorithms. COMP128 is the reference algorithm for the tasks pointed out by the GSM Consortium. Other algorithms have been named as well, but almostevery operator uses the COMP128 except a couple of exceptions.

Ø The COMP128 generates both the SRES response (32 bits) and thesession key, Kc, on one run. The last 54 bits of the COMP128 output form the session key, Kc, until the MS is authenticated again. Note that the key length at this point is 54 bits instead of 64 bits, which is the length of the key given as input to the A5 algorithm. Ten zero-bits are appended to the key generated by the COMP128 algorithm.Thus, we have a key of 64 bits with the last ten bits zeroed out.

Ø The A5 algorithm is the stream cipher used to encrypt over-the-air transmissions, which will be discussed in detail in Section 6.

Page 16: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 16

Possible Interception Attacks in GSM

n Accessing the Signaling NetworkThe transmissions are encrypted only between the MS and the BTS. After the BTS, the traffic is transmitted in plain text within the operators network . The SS7 signaling network used in the operator's GSM network is completely insecure if the attacker gains direct access to it.

Page 17: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 17

Ø Retrieving the Key from the SIMThe attack is based on a chosen-challenge attack that works, because the COMP128 algorithm is broken in such a way that it reveals information about the Ki when the appropriate RANDs are given as arguments to the A8 algorithm. The SIM was accessed through a smartcard reader connected to a PC. The PC made about 150.000 challenges to the SIM and the SIM generated the SRES and the session key, Kc, based on the challenge and the secret key. The secret key could be deduced from the SRES responses through differential cryptanalysis. The smartcard reader used in implementing the attack could make 6.25 queries per second to the SIM card. So the attack required about eight hours to conduct.

Possible Interception Attacks in GSM (Cont.)

Page 18: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 18

Ø Retrieving the Key from the SIM over the AirThe attack might be conducted in a subway, where the signal of the legitimate BTS is not available, but the phone is still turned on. The subscriber would be unaware of such an attack though the fact that the battery of the phone has run out slightly quicker than usual might make him suspicious. The attack can also be performed in parts: instead of performing an eight-hour attack, the attacker could tease the phone for twenty minutes every day on the victim's way to work.

Possible Interception Attacks in GSM (Cont.)

Page 19: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 19

Possible Interception Attacks in IS-95 CDMA

Ø A recent paper in SAC 2000 workshop showed that the eavesdropping the downlink traffic channel 1 second, the eavesdropper can get enough information to recover the voice privacy.

Page 20: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 20

Security Issues in 3G Systems

Ø The level of protectionØ One weakness in GSM security protocol is that mobile identity is

not always encrypted when transmitted over the air interface. Ø In IP-world, denial of service attacks cannot be made impossible,

but they can be made more difficult to implement by using sophisticated firewalls, good network design, etc.

Ø The algorithms used should be made public so that they can be tested.

Ø System should also be modular so that an algorithm, if found flawed, could be replaced with a better algorithm.

Page 21: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 21

Ø Charging Ø Nowadays the charge of the SMS (Short Message Service)

or WAP (Wireless Application Protocol) based service is typically not indicated by the service provider to the user when he or she uses the service.

Ø Another issue is that the on-line indication of the charges could cut down the use of the services. This flaw has recently been criticized by the Finnish Consumer Office.

Security Issues in 3G Systems (Cont.)

Page 22: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 22

Ø PrivacyThe location and consumer habits of users are valuable information for service creation and marketing purposes. A policy about the collection, storage, use, disclosure, and selling of this data is required. In Finland the constitution and different laws.

Security Issues in 3G Systems (Cont.)

Page 23: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 23

Ø Terminal Security: Smart Card with PIN number has been used to protect terminal security

AbbreviationAbbreviation Full NameFull Name Defining StandardDefining StandardSIM Subscriber Identity Module GSMUIM User Identity Module IS-95USIM Universal SIM UMTSR-UIM Removable UIM CDMA2000WIM Wireless Identity Module WAP

Security Issues in 3G Systems (Cont.)

Page 24: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 24

Security Issues in 3G Systems

Lawful InterceptionThe UMTS and GSM, like all telecom systems, allow lawful interception for authorized law and enforcement agencies. This is required by national laws and EU directives, and is used for crime investigation and national security. The Internet users have traditionally very negative attitudes towards monitoring of their communications, and lawful interception can become at least an image problem for the new IP-services of the telecom systems.

Page 25: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 25

Security Trends in 3G Systems

Ø Offer complete security solutions-not just provide protection over the radio link

Ø Offer negotiationØ Offer mutual authenticationØ Offer data confidentiality and data/signaling authenticationØ Prevent replay attack on the signalingØ Provide period data authenticationØ Use SIM cardØ Mobile handset shows “um-encrypted mode”Ø Universal roamingØ Continuously migrate to 4G systems in terms of enhanced security,

services, access media, data rate, capabilities

Page 26: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 26

Security in 4G Systems

Ø Use public-key algorithms for key agreement, privacy and authentication

Ø Provide non-repudiation servicesØ Provide key recovery (escrow)Ø Universal access to any type of media and devicesØ Integrate services, including payment and charging

Page 27: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 27

6.5. Some Concerns in Multimedia Security and Low Cost Cryptography

Ø Adopt AES or Standardize a New Cipher: For multimedia encryption, the working group of multimedia security is in discussion of to adopt the AES (will be introduced in next chapter) or standard a particular cipher for that. The main concern here is the nature of multimedia signals, it may not need the cipher as strong as the AES. For example, for pay-for-view TV, if only partial of content of a movie is encrypted, then it is secure enough since human being’s tolerance of eyes is limited.

Page 28: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 28

Note. A GSM conversation is sent as a sequence of frames per 4.6 millisecond, and each frame contains 228 bits.

A. A5/1 stream cipher key generator for secure GSMconversations

6.6 Case Study: A5 Stream Cipher

Page 29: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 29

Description of the A5/1 stream cipher: 64-bit key to generate a key stream where each 228-bit used for one frame (228-bit) encryption.

A5

K,64-bit key

1-bit output

228-bit buffer

1 frame

228-bit228-bit

GSM message:

Output: 228-bit ciphertext, one frame of cipher

Bitwise addition

Page 30: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 30

3. LFSR 3: generates c = {c(t)}.

Parameters:

(a) Three LSFRs which generate m-sequences with periods 219 - 1,

222 - 1, 223 - 1, respectively.

1. LFSR 1: generates a = {a(t)}.1)( 25191 ++++= xxxxxf

2. LFSR 2: generates b = {b(t)}.1)( 222 ++= xxxf

1)( 216233 ++++= xxxxxf

4. Tap positions: d1 = 11, d2 = 12 and d3 = 13.

Construction of A5/1 Generator:

Page 31: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 31

),,( ))13(),12(),11((

321 yyytctbtaf

=+++

)13( )12( )11( +++ tctbta

(1,1,1) 0 0 0 1 1 1

(1,1,0) 0 0 1 1 1 0

(0,1,1) 0 1 1 1 0 0

(1,0,1) 1 0 1 0 1 0

(b) Majority function f(x1, x2, x3) = (y1, y2, y3) is defined by

Output:The output sequence u = {u(t)} which performs at time t,

u(t) = a(i1) + b(i2) + c(i3), t = 0, 1, ...

where i1, i2, and i3 are determined in a stop-and-go clock controlled model by the majority function f.

Page 32: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 32

0 1 2 518… …

0 1 2 21…

11

…12

0 1 2 22……

13…

16

f: Majority function

Stop/go control

y1Stop/go control

y3

y2

A5/1 Key Stream Generator

Stop/go control

output

Page 33: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 33

For example, at time t, if

f(a(t+11), b(t+12), c(t+13)) = (1, 1, 0)

i.e., (y1, y2, y3)=(1, 1, 0), then LFSR 1 and LFSR 2 are clocked and LFSR 3 has no clock pulse.

Session key or seed: initial states for three LFSRs, a total of 64 bits.

Page 34: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 34

Note 2. The first 'original' A5 algorithm was renamed A5/1. Other algorithms include A5/0, which means no encryption at all, and A5/2, a weaker over-the-air privacy algorithm. Generally, the A5 algorithms after A5/1 have been named A5/x. Most of the A5/x algorithms are considerably weaker than the A5/1, which has the time complexity of 254 at most as, shown above. The estimated time complexity of A5/2 is as low as 216. A5/3 is available in the work group of wireless communications

Page 35: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 35

What does A5/1 suffer ?

• It can be broken with few hours by a PC. • Short period problem: Without stop/go operation, the period of sum of the three LFSRs is given by

(219-1)( 222-1)(223-1). However, the experiement shows that the period of A5/1 is arround

(4/3)(223-1).

• Collision problem: different seeds (i.e., different initial states of three LFSRs) may result in the same key stream (our new results shows that only 70% seeds produce different key streams.)• The maority function is the worst function in terms of correlation with all affine functions.

Page 36: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 36

Possible Attacks on A5/1

Ø Brute-Force Attack against A5If we have a Pentium III class chip with approximately 20 million transistors and the implementation of one set of LSFRs (A5/1) would require about 2000 transistors, we would have a set of 10,000 parallel A5/1 implementations on one chip. If the chip was clocked to 600 MHz, we could try approximately 2M keys per second per A5/1 implementation. A key space of 254 keys would thus require about 900,000 seconds, 250 hours, with one chip.

Ø Alex Biryukov and Adi Shamir (co-inventor of the RSA) claim to be able to penetrate the security of a A5/1 ciphered GSM call in less than one second using a PC with 128 MB RAM and large hard drives.

Page 37: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 37

Description of w7: The w7 algorithm is a byte-wide, synchronous stream cipher optimized for efficient hardware implementation at very high data rates. It is a symmetric key algorithm supporting key lengths of 128 bits. It contains eight similar models, C1, C2, …, C8 where C2 is illustrated as follows.

w7 stream cipher algorithm is proposed by S. Thomas, D. Anthony, T. Berson , and G. Gong published as an INTERNET DRAFT, April 2002.

6.7. w7 -- an Analogue Cipher of A5

Page 38: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 38

C1

K,128-bit key

1-bit output

K

C2 …

K

C8

1-byte output

Page 39: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 39

0k0

...4k4

...7k7

8k8

9k9

10k10

...14k14

15k15

16k16

17k17

18k18

...21k21

22k22

23k23

24k24

...27k27

28k28

...31k31

32k32

...35k35

36k36

37k37

0k0

2k2

4k4

5k5

...16k16

...24k24

...29k29

30k30

31k31

33k33

34k34

35k35

36k36

38k38

39k39

41k41

42k42

1k1

3k3

32k32

37k37

40k40

0k0

...4k4

...18k18

...22k22

...27k27

...32k32

33k33

...39k39

...44k44

45k45

46k46

26k26

38k38

Majority function

The W7 Cipher Algorithm

output

Page 40: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 40

Self reading.

6.8. Correlation Attack to Stream Ciphers

Page 41: Chapter 6. Stream Cipher Design - UoAcgi.di.uoa.gr/~halatsis/Crypto/Bibliografia/Crypto...Security Issues in 3G Systems Ø The level of protection Ø One weakness in GSM security protocol

@G. Gong, 2003 41

References

1. “GSM (and PCN ) security and encryption”, at Brooksonhttp://www.brookson.com/gsm/gsmdoc.htm

2. “GSM interception” , at http://www.dia.unisa.it/ads.dir/corso-security/www/CORSO-9900/a5/Netsec/netsec.html

3. “Wireless security”, http://www.compaq.ch/ins_wpwirelesssecurity.pdf

4. “Security of mobile systems from user's point of view“, at http://www.hut.fi/~hansen/papers/user-secu/