Please use this identifier to cite or link to this item: https://doi.org/10.1007/978-3-642-34704-7-20
Title: The stream cipher core of the 3GPP encryption standard 128-EEA3: Timing attacks and countermeasures
Authors: Sekar, G. 
Keywords: cache timing attack
key recovery
Stream cipher
Issue Date: 2012
Citation: Sekar, G. (2012). The stream cipher core of the 3GPP encryption standard 128-EEA3: Timing attacks and countermeasures. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 7537 LNCS : 269-288. ScholarBank@NUS Repository. https://doi.org/10.1007/978-3-642-34704-7-20
Abstract: The core of the 3 rd Generation Partnership Project (3GPP) encryption standard 128-EEA3 is a stream cipher called ZUC. It was designed by the Chinese Academy of Sciences and proposed for inclusion in the cellular wireless standards called Long Term Evolution or 4G. The LFSR-based cipher uses a 128-bit key. In this paper, we first show timing attacks on ZUC that can recover, with about 71.43% success rate, (i) one bit of the secret key immediately, and (ii) information involving 6 other key bits. The time, memory and data requirements of the attacks are negligible. While we see potential improvements to the attacks, we also suggest countermeasures. © 2012 Springer-Verlag Berlin Heidelberg.
Source Title: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
URI: http://scholarbank.nus.edu.sg/handle/10635/128920
ISBN: 9783642347030
ISSN: 03029743
DOI: 10.1007/978-3-642-34704-7-20
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.