期刊论文详细信息
| IEICE Electronics Express | |
| Cryptanalysis of the cellular authentication and voice encryption algorithm | |
| Praveen Gauravaram1  William Millan1  | |
| [1] Information Security Research Centre, Queensland University of Technology | |
| 关键词: cryptographic hash function; CAVE algorithm; reconstruction attack; list attack; | |
| DOI : 10.1587/elex.1.453 | |
| 学科分类:电子、光学、磁材料 | |
| 来源: Denshi Jouhou Tsuushin Gakkai | |
PDF
|
|
【 摘 要 】
References(5)This paper presents two methods for cryptanalysis of the CAVE algorithm, a four or eight round cryptographic algorithm currently used in mobile telephony. Our attacks demonstrate that CAVE is insecure (with any number of rounds) as a hash function for authentication or data integrity applications.
【 授权许可】
Unknown
【 预 览 】
| Files | Size | Format | View |
|---|---|---|---|
| RO201911300209567ZK.pdf | 156KB |
PDF