Please use this identifier to cite or link to this item: https://doi.org/10.1007/978-3-642-34704-7-20
Title: The stream cipher core of the 3GPP encryption standard 128-EEA3: Timing attacks and countermeasures
Authors: Sekar, G. 
Keywords: cache timing attack
key recovery
Stream cipher
Issue Date: 2012
Citation: Sekar, G. (2012). The stream cipher core of the 3GPP encryption standard 128-EEA3: Timing attacks and countermeasures. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) 7537 LNCS : 269-288. ScholarBank@NUS Repository. https://doi.org/10.1007/978-3-642-34704-7-20
Abstract: The core of the 3 rd Generation Partnership Project (3GPP) encryption standard 128-EEA3 is a stream cipher called ZUC. It was designed by the Chinese Academy of Sciences and proposed for inclusion in the cellular wireless standards called Long Term Evolution or 4G. The LFSR-based cipher uses a 128-bit key. In this paper, we first show timing attacks on ZUC that can recover, with about 71.43% success rate, (i) one bit of the secret key immediately, and (ii) information involving 6 other key bits. The time, memory and data requirements of the attacks are negligible. While we see potential improvements to the attacks, we also suggest countermeasures. © 2012 Springer-Verlag Berlin Heidelberg.
Source Title: Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
URI: http://scholarbank.nus.edu.sg/handle/10635/128920
ISBN: 9783642347030
ISSN: 03029743
DOI: 10.1007/978-3-642-34704-7-20
Appears in Collections:Staff Publications

Show full item record
Files in This Item:
There are no files associated with this item.

Page view(s)

28
checked on Dec 2, 2021

Google ScholarTM

Check

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.