期刊论文详细信息
IEICE Electronics Express
Cryptanalysis of the cellular authentication and voice encryption algorithm
Praveen Gauravaram1  William Millan1 
[1] Information Security Research Centre, Queensland University of Technology
关键词: cryptographic hash function;    CAVE algorithm;    reconstruction attack;    list attack;   
DOI  :  10.1587/elex.1.453
学科分类:电子、光学、磁材料
来源: Denshi Jouhou Tsuushin Gakkai
PDF
【 摘 要 】

References(5)This paper presents two methods for cryptanalysis of the CAVE algorithm, a four or eight round cryptographic algorithm currently used in mobile telephony. Our attacks demonstrate that CAVE is insecure (with any number of rounds) as a hash function for authentication or data integrity applications.

【 授权许可】

Unknown   

【 预 览 】
附件列表
Files Size Format View
RO201911300209567ZK.pdf 156KB PDF download
  文献评价指标  
  下载次数:16次 浏览次数:17次