Please use this identifier to cite or link to this item:
https://doi.org/10.1007/978-3-642-34704-7-20
Title: | The stream cipher core of the 3GPP encryption standard 128-EEA3: Timing attacks and countermeasures | Authors: | Sekar, G. | Keywords: | cache timing attack key recovery Stream cipher |
Issue Date: | 2012 | Citation: | Sekar, G. (2012). The stream cipher core of the 3GPP encryption standard 128-EEA3: Timing attacks and countermeasures. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 7537 LNCS : 269-288. ScholarBank@NUS Repository. https://doi.org/10.1007/978-3-642-34704-7-20 | Abstract: | The core of the 3 rd Generation Partnership Project (3GPP) encryption standard 128-EEA3 is a stream cipher called ZUC. It was designed by the Chinese Academy of Sciences and proposed for inclusion in the cellular wireless standards called Long Term Evolution or 4G. The LFSR-based cipher uses a 128-bit key. In this paper, we first show timing attacks on ZUC that can recover, with about 71.43% success rate, (i) one bit of the secret key immediately, and (ii) information involving 6 other key bits. The time, memory and data requirements of the attacks are negligible. While we see potential improvements to the attacks, we also suggest countermeasures. © 2012 Springer-Verlag Berlin Heidelberg. | Source Title: | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | URI: | http://scholarbank.nus.edu.sg/handle/10635/128920 | ISBN: | 9783642347030 | ISSN: | 03029743 | DOI: | 10.1007/978-3-642-34704-7-20 |
Appears in Collections: | Staff Publications |
Show full item record
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.