Weak key-IV pairs in the A5/1 stream cipher


Autoria(s): Al Hamdan, Ali; Bartlett, Harry; Dawson, Ed; Simpson, Leonie; Wong, Kenneth Koon-Ho
Contribuinte(s)

Parampalli, Udaya

Welch, Ian

Data(s)

01/01/2014

Resumo

A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of the secret key and IV during the initialisation process of A5/1. We demonstrate the existence of weak key-IV pairs in the A5/1 cipher due to this loading process; these weak key-IV pairs may generate one, two or three registers containing all-zero values, which may lead in turn to weak keystream sequences. In the case where two or three registers contain only zeros, we describe a distinguisher which leads to a complete decryption of the affected messages.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/64105/

Publicador

Australian Computer Society, Inc.

Relação

http://eprints.qut.edu.au/64105/1/AISC_2014_-_Paper_3_-_final.pdf

http://crpit.com/Vol149.html

Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed , Simpson, Leonie, & Wong, Kenneth Koon-Ho (2014) Weak key-IV pairs in the A5/1 stream cipher. In Parampalli, Udaya & Welch, Ian (Eds.) Proceedings of the Twelfth Australasian Information Security Conference (AISC 2014) [Conferences in Research and Practice in Information Technology, Volume 149], Australian Computer Society, Inc., Auckland, New Zealand, pp. 23-36.

Direitos

Copyright 2014 Australian Computer Society, Inc.

This paper appeared at the Australasian Information Security Conference (ACSW-AISC 2014), Auckland, New Zealand, January 2014. Conferences in Research and Practice in Information Technology (CRPIT), Vol. 149, Udaya Parampalli and Ian Welch, Ed. Reproduction for academic, not-for-profit purposes permitted provided this text is included.

Fonte

School of Electrical Engineering & Computer Science; Institute for Future Environments; School of Mathematical Sciences; Science & Engineering Faculty

Palavras-Chave #080400 DATA FORMAT #080402 Data Encryption #A5/1 #initialisation process #loading phase #weak key-IV pairs #ciphertext only attack #stream cipher
Tipo

Conference Paper