? - ? ? - - ? ? ? ? ? ? Plaintext Ciphertext Plaintext

نویسنده

  • Lauri Tarkkala
چکیده

This paper describes the GSM voice confidentiality cipher A5/1 and surveys a set of attacks against it. The attacks clearly demonstrate that A5/1 does not provide sufficient levels of security for protecting the confidentiality of GSM voice traffic.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

From Differential Cryptanalysis to Ciphertext-Only Attacks

We present a method for efficient conversion of differential (chosen plaintext) attacks into the more practical known plaintext and ciphertext-only attacks. Our observation may save up to a factor of 2 in data over the known methods, assuming that plaintext is ASCII encoded English (or some other types of highly redundant data). We demonstrate the effectiveness of our method by practical attack...

متن کامل

- Only

We present a method for eecient conversion of diierential (chosen-plaintext) attacks into the more practical known-plaintext and ciphertext-only attacks. Our observation may save up to a factor of 2 20 in data over the known methods, assuming that plaintext is ASCII encoded English (or some other types of highly redundant data). We demonstrate the eeectiveness of our method by practical attacks...

متن کامل

A Programmable Plaintext Recognizer

Other researchers have studied the feasibility of a brute force attack on DES using several known plaintexts. In practice, known plain-text/ciphertext pairs may not be readily available, but statistical information about similar plaintexts is much more easily aquired. Accordingly , we design a statistical plaintext recognizer suitable for use in a ciphertext-only key search machine. Software si...

متن کامل

An Adaptive-Ciphertext Attack against "I ⊕ C" Block Cipher Modes With an Oracle

Certain block cipher confidentiality modes are susceptible to an adaptive chosen-ciphertext attack against the underlying format of the plaintext. When the application decrypts altered ciphertext and attempts to process the manipulated plaintext, it may disclose information about intermediate values resulting in an oracle. In this paper we describe how to recognize and exploit such an oracle to...

متن کامل

Plaintext Awareness via Key Registration

In this paper, we reconsider the notion of plaintext awareness. We present a new model for plaintext-aware encryption that is both natural and useful. We achieve plaintext-aware encryption without random oracles by using a third party. However, we do not need to trust the third party: even when the third party is dishonest, we still guarantee security against adaptive chosen ciphertext attacks....

متن کامل

Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree

Using recent results from coding theory, it is shown how to break block ciphers operating on GF(q) where the ciphertext is express-ible as evaluations of an unknown univariate polynomial of low degree m over the plaintext with a typically low but non-negligible probability. The method employed is essentially Sudan's algorithm for decoding Reed-Solomon codes beyond the error-correction diameter....

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2000