Design of F8 Encryption Algorithm Based on Customized Kasumi Block Cipher
نویسندگان
چکیده
منابع مشابه
Design Principles of the KASUMI Block Cipher
In this paper, we discuss some of theory of provable security against differential and linear cryptanalysis. We also review the design principles of the block cipher KASUMI—especially its resistance against the basic forms of linear and differential cryptanalysis.
متن کاملProvable Security of KASUMI and 3GPP Encryption Mode f8
Within the security architecture of the 3GPP system there is a standardised encryption mode f8 based on the block cipher KASUMI. In this work we examine the pseudorandomness of the block cipher KASUMI and the provable security of f8. First we show that the three round KASUMI is not a pseudorandom permutation ensemble but the four round KASUMI is a pseudorandom permutation ensemble under the ada...
متن کاملStatistical Analysis of KASUMI Block Cipher
A block cipher or a message authentication code(MAC ) should behave as random mapping which can be evaluated during statistical tests. Statistical test suites typically used for evaluation of random mapping are NIST, Diehard, Dieharder and TestU01 which are not well-suited for block ciphers and MAC s. These test suites employ frequentist approach;thus, making it difficult to overall evaluate th...
متن کاملMultidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI
The block cipher KASUMI, proposed by ETSI SAGE more than 10 years ago, is widely used for security in many synchronous wireless standards nowadays. For instance, the confidentiality and integrity of 3G mobile communications systems depend on the security of KASUMI. Up to now, there are a great deal of cryptanalytic results on KASUMI, however, its security evaluation against the recent zero-corr...
متن کاملA Very Compact Hardware Implementation of the KASUMI Block Cipher
For mobile devices, this paper proposes a compact hardware (H/W) implementation for the KASUMI block cipher, which is the 3GPP standard encryption algorithm. In [4], Yamamoto et al. proposed the method of reducing temporary registers for the MISTY1 FO function (YYI-08), and implemented a very compact MISTY1H/W. This paper aims to design the smallest KASUMIH/W by the application of YYI-08 to KAS...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer and Communication Engineering
سال: 2013
ISSN: 2010-3743
DOI: 10.7763/ijcce.2013.v2.213