CY1114390T1 - Μεθοδος και συστημα κρυπταναλυσης της κυπτογραφησης gsm - Google Patents
Μεθοδος και συστημα κρυπταναλυσης της κυπτογραφησης gsmInfo
- Publication number
- CY1114390T1 CY1114390T1 CY20131100743T CY131100743T CY1114390T1 CY 1114390 T1 CY1114390 T1 CY 1114390T1 CY 20131100743 T CY20131100743 T CY 20131100743T CY 131100743 T CY131100743 T CY 131100743T CY 1114390 T1 CY1114390 T1 CY 1114390T1
- Authority
- CY
- Cyprus
- Prior art keywords
- cryptanalysis
- gives
- session key
- encryption
- internal state
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/306—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/002—Countermeasures against attacks on cryptographic mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/304—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy based on error correction codes, e.g. McEliece
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/065—Continuous authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/126—Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/24—Key scheduling, i.e. generating round keys or sub-keys for block encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
- H04W4/14—Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/04—Large scale networks; Deep hierarchical networks
- H04W84/042—Public Land Mobile systems, e.g. cellular systems
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Technology Law (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
- Measuring And Recording Apparatus For Diagnosis (AREA)
- Test And Diagnosis Of Digital Computers (AREA)
Abstract
Μια μέθοδος κρυπτανάλυσης που περιλαμβάνει: (Α) Την εκτέλεση μιας άμεσης κρυπτανάλυσης μόνο κρυπτογραφημένου κείμενου του Α5/1 και (Β) Την χρήση των αποτελεσμάτων του βήματος (Α) για την διευκόλυνση της αποκρυπτογράφησης και/ή κρυπτογράφησης περαιτέρω cryptanalysis method comprising: επικοινωνιών οι οποίες είναι ομοιογενείς με την κρυπτογράφηση και χρησιμοποιούν το κλειδί περιόδου λειτουργίας, οπού η κρυπτανάλυση θεωρεί ότι μέρος των bit του κλειδιού περιόδου λειτουργίας έχει μια γνωστή σταθερή τιμή , και όπου η κρυπτανάλυση βρίσκει το κλειδί περιόδου λειτουργίας. Μια αποδοτική επίθεση γνωστού απλού κειμένου σε Α5/2 περιλαμβάνει τη δοκιμή όλων των πιθανών τιμών για το R4ο, και για κάθε τιμή που επιλύει το γραμμικοποιημένο σύστημα εξισώσεων που περιγράφουν την απόδοση. Η επίλυση των εξισώσεων μας δίνει την εσωτερική κατάσταση των R1, R2, and R3, μαζί με το R4, αυτό μας δίνει την συνολική εσωτερική κατάσταση, το οποίο μας δίνει μια πρόταση για το κλειδί.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
IL15567103A IL155671A (en) | 2003-04-30 | 2003-04-30 | Method and system of encryption decryption |
EP04730621.2A EP1623529B1 (en) | 2003-04-30 | 2004-04-30 | Method and system for the cryptanalysis of GSM encryption |
Publications (1)
Publication Number | Publication Date |
---|---|
CY1114390T1 true CY1114390T1 (el) | 2016-08-31 |
Family
ID=33397642
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CY20131100743T CY1114390T1 (el) | 2003-04-30 | 2013-08-29 | Μεθοδος και συστημα κρυπταναλυσης της κυπτογραφησης gsm |
CY20201100203T CY1122836T1 (el) | 2003-04-30 | 2020-03-06 | Συσκευη και μεθοδος κρυπταναλυσης gsμ |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CY20201100203T CY1122836T1 (el) | 2003-04-30 | 2020-03-06 | Συσκευη και μεθοδος κρυπταναλυσης gsμ |
Country Status (10)
Country | Link |
---|---|
US (8) | US8009826B2 (el) |
EP (2) | EP1623529B1 (el) |
CY (2) | CY1114390T1 (el) |
DK (1) | DK2663019T3 (el) |
ES (1) | ES2777930T3 (el) |
HU (1) | HUE048094T2 (el) |
IL (1) | IL155671A (el) |
PL (2) | PL1623529T3 (el) |
SI (1) | SI2663019T1 (el) |
WO (1) | WO2004098112A2 (el) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2009090432A2 (en) * | 2008-01-17 | 2009-07-23 | Vodafone Group Plc | Improving security in telecommunications systems |
CN101252785B (zh) * | 2008-03-21 | 2012-05-23 | 华为技术有限公司 | 无线通信的方法、系统及基站 |
EP2337387A1 (en) * | 2009-12-18 | 2011-06-22 | NetHawk Oyj | Interception and control of ongoing radio connections through interposition and impersonation of a mobile device and cellular radio system |
FR2960366A1 (fr) * | 2010-05-20 | 2011-11-25 | Ingenico Sa | Procede d’obtention de cles de chiffrement, terminal, serveur, et produits programmes d’ordinateurs correspondants |
US9356785B2 (en) * | 2011-02-15 | 2016-05-31 | Blackberry Limited | Method and system for security enhancement for mobile communications |
US8165618B1 (en) | 2011-02-24 | 2012-04-24 | Research In Motion Limited | Methods and systems for slow associated control channel signaling |
US9262639B2 (en) * | 2013-01-09 | 2016-02-16 | Cisco Technology Inc. | Plaintext injection attack protection |
EP3200390B1 (en) * | 2014-09-25 | 2019-10-30 | Nec Corporation | Analysis system, analysis device, analysis method, and storage medium having analysis program recorded therein |
CN107113171B (zh) * | 2015-12-10 | 2019-03-29 | 深圳市大疆创新科技有限公司 | 安全通信系统、方法及装置 |
US11265300B1 (en) | 2018-12-29 | 2022-03-01 | Whatsapp Llc | Methods and systems for transmitting anonymized information |
CN112039654A (zh) * | 2020-08-26 | 2020-12-04 | 上海电力大学 | 一种抵御中间人攻击的电表数据安全采集方法 |
CN113852954A (zh) * | 2021-09-15 | 2021-12-28 | 支付宝(杭州)信息技术有限公司 | 保护gprs网络中数据安全的方法和装置 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5778074A (en) * | 1995-06-29 | 1998-07-07 | Teledyne Industries, Inc. | Methods for generating variable S-boxes from arbitrary keys of arbitrary length including methods which allow rapid key changes |
US5809140A (en) * | 1996-10-15 | 1998-09-15 | Bell Communications Research, Inc. | Session key distribution using smart cards |
CN1157020C (zh) * | 1997-04-23 | 2004-07-07 | 松下电器产业株式会社 | 提高了安全性的密码处理装置 |
US6560338B1 (en) * | 1998-08-28 | 2003-05-06 | Qualcomm Incorporated | Limiting delays associated with the generation of encryption stream ciphers |
US7113600B1 (en) * | 1999-11-12 | 2006-09-26 | Telefonaktiebolaget Lm Ericsson (Publ) | Base transceiver station automatic encryption handling |
US20010031050A1 (en) * | 2000-02-14 | 2001-10-18 | Lateca Computer Inc. N.V. | Key generator |
WO2001089253A1 (en) | 2000-05-18 | 2001-11-22 | Ico Services Ltd. | Connection authentication in a mobile network |
US20030012372A1 (en) * | 2001-04-25 | 2003-01-16 | Cheng Siu Lung | System and method for joint encryption and error-correcting coding |
-
2003
- 2003-04-30 IL IL15567103A patent/IL155671A/en active IP Right Review Request
-
2004
- 2004-04-30 SI SI200432488T patent/SI2663019T1/sl unknown
- 2004-04-30 PL PL04730621T patent/PL1623529T3/pl unknown
- 2004-04-30 US US10/554,587 patent/US8009826B2/en active Active
- 2004-04-30 EP EP04730621.2A patent/EP1623529B1/en not_active Expired - Lifetime
- 2004-04-30 DK DK13169371.5T patent/DK2663019T3/da active
- 2004-04-30 EP EP13169371.5A patent/EP2663019B1/en not_active Expired - Lifetime
- 2004-04-30 WO PCT/IL2004/000364 patent/WO2004098112A2/en active Application Filing
- 2004-04-30 HU HUE13169371A patent/HUE048094T2/hu unknown
- 2004-04-30 PL PL13169371T patent/PL2663019T3/pl unknown
- 2004-04-30 ES ES13169371T patent/ES2777930T3/es not_active Expired - Lifetime
-
2011
- 2011-07-18 US US13/184,775 patent/US8295477B2/en not_active Expired - Lifetime
-
2012
- 2012-09-20 US US13/623,277 patent/US9038192B2/en active Active
-
2013
- 2013-08-29 CY CY20131100743T patent/CY1114390T1/el unknown
-
2015
- 2015-05-14 US US14/711,804 patent/US9634832B2/en not_active Expired - Lifetime
-
2017
- 2017-03-22 US US15/465,629 patent/US9887972B2/en not_active Expired - Lifetime
-
2018
- 2018-01-02 US US15/859,795 patent/US10447666B2/en not_active Expired - Fee Related
-
2019
- 2019-09-11 US US16/566,917 patent/US10924462B2/en not_active Expired - Lifetime
-
2020
- 2020-03-06 CY CY20201100203T patent/CY1122836T1/el unknown
-
2021
- 2021-01-15 US US17/149,773 patent/US20210367931A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
EP1623529A2 (en) | 2006-02-08 |
US9038192B2 (en) | 2015-05-19 |
US8009826B2 (en) | 2011-08-30 |
US20150244519A1 (en) | 2015-08-27 |
US9887972B2 (en) | 2018-02-06 |
US20210367931A1 (en) | 2021-11-25 |
US20200112547A1 (en) | 2020-04-09 |
US10924462B2 (en) | 2021-02-16 |
DK2663019T3 (da) | 2020-03-16 |
EP2663019A3 (en) | 2017-07-19 |
US20070147621A1 (en) | 2007-06-28 |
EP2663019B1 (en) | 2019-12-18 |
SI2663019T1 (sl) | 2020-04-30 |
US20130083918A1 (en) | 2013-04-04 |
IL155671A (en) | 2004-12-15 |
WO2004098112A2 (en) | 2004-11-11 |
US20110280393A1 (en) | 2011-11-17 |
EP1623529A4 (en) | 2011-08-31 |
CY1122836T1 (el) | 2021-05-05 |
US9634832B2 (en) | 2017-04-25 |
EP1623529B1 (en) | 2013-05-29 |
US10447666B2 (en) | 2019-10-15 |
EP2663019A2 (en) | 2013-11-13 |
US20170195301A1 (en) | 2017-07-06 |
IL155671A0 (en) | 2004-05-12 |
HUE048094T2 (hu) | 2020-05-28 |
US20190028446A1 (en) | 2019-01-24 |
US8295477B2 (en) | 2012-10-23 |
ES2777930T3 (es) | 2020-08-06 |
PL2663019T3 (pl) | 2020-06-29 |
WO2004098112A3 (en) | 2005-01-13 |
PL1623529T3 (pl) | 2013-11-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CY1114390T1 (el) | Μεθοδος και συστημα κρυπταναλυσης της κυπτογραφησης gsm | |
HK1091338A1 (en) | Authentication method | |
ATE472133T1 (de) | Entschlüsselungsverfahren | |
GB2442546B (en) | Authenticated encryption method and apparatus | |
JP2008545163A5 (el) | ||
US20170048058A1 (en) | Method and system for generating/decrypting ciphertext, and method and system for searching ciphertexts in a database | |
TW200633457A (en) | Method for generating data for detection of tampering, and method and apparatus for detection of tampering | |
NO20014774L (no) | System, b¶rbar anordning og fremgangsmåte for digital autentisering, kryptering og signering ved generering av flyktige, men konsistente ogrepeterbare kryptonökler | |
WO2007120172A3 (en) | Encrypting a plaintext message with authentication | |
ATE463799T1 (de) | Darstellung gesicherter digitaler inhalte unter verwendung von verketteten digitalen lizenzen | |
NZ603822A (en) | Permutation data transform to enhance security | |
ATE435466T1 (de) | Viruserkennungssystem | |
CN103942500B (zh) | 基于噪声的哈希密文再加密方法及再加密后的解密方法 | |
NZ596935A (en) | Generating an encryption/decryption key by comparing data sets received from a central server | |
WO2006012638A3 (en) | Techniques to strengthen one-time pad encryption | |
US9485226B2 (en) | Method for including an implicit integrity or authenticity check into a white-box implementation | |
FI20075776A0 (fi) | Päästä-päähän salattu viestintä | |
US9059838B2 (en) | Encryption algorithm with randomized buffer | |
TW200709634A (en) | Encryption device, encryption method, decryption device, decryption method, and data structure | |
DE60317498D1 (de) | Verfahren und System zur Schlüsseldistribution mit einem Authentifizierungschritt und einem Schlüsseldistributionsschritt unter Verwendung von KEK (key encryption key) | |
WO2007044042A3 (en) | Encryption methods and apparatus | |
WO2002011361A3 (en) | Data encryption and decryption using error correction methodologies | |
EP1632943A3 (en) | Method of preventing multimedia copy | |
WO2007107976A3 (en) | Period keys | |
TW200627895A (en) | File encryption system having key recovery function and its method thereof |