IL155671A - Method and system of encryption decryption - Google Patents

Method and system of encryption decryption

Info

Publication number
IL155671A
IL155671A IL15567103A IL15567103A IL155671A IL 155671 A IL155671 A IL 155671A IL 15567103 A IL15567103 A IL 15567103A IL 15567103 A IL15567103 A IL 15567103A IL 155671 A IL155671 A IL 155671A
Authority
IL
Israel
Prior art keywords
attack
cryptanalysis
attacker
network
variables
Prior art date
Application number
IL15567103A
Other languages
English (en)
Hebrew (he)
Other versions
IL155671A0 (en
Inventor
Elad Barkan
Eli Biham
Original Assignee
Elad Barkan
Kefar Sirkin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=33397642&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=IL155671(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Elad Barkan, Kefar Sirkin filed Critical Elad Barkan
Priority to IL15567103A priority Critical patent/IL155671A/en
Priority to EP13169371.5A priority patent/EP2663019B1/en
Priority to US10/554,587 priority patent/US8009826B2/en
Priority to HUE13169371A priority patent/HUE048094T2/hu
Priority to PL04730621T priority patent/PL1623529T3/pl
Priority to EP04730621.2A priority patent/EP1623529B1/en
Priority to ES13169371T priority patent/ES2777930T3/es
Priority to DK13169371.5T priority patent/DK2663019T3/da
Priority to PCT/IL2004/000364 priority patent/WO2004098112A2/en
Priority to SI200432488T priority patent/SI2663019T1/sl
Priority to PL13169371T priority patent/PL2663019T3/pl
Publication of IL155671A0 publication Critical patent/IL155671A0/xx
Publication of IL155671A publication Critical patent/IL155671A/en
Priority to US13/184,775 priority patent/US8295477B2/en
Priority to US13/623,277 priority patent/US9038192B2/en
Priority to CY20131100743T priority patent/CY1114390T1/el
Priority to US14/711,804 priority patent/US9634832B2/en
Priority to US15/465,629 priority patent/US9887972B2/en
Priority to US15/859,795 priority patent/US10447666B2/en
Priority to US16/566,917 priority patent/US10924462B2/en
Priority to CY20201100203T priority patent/CY1122836T1/el
Priority to US17/149,773 priority patent/US20210367931A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0457Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • H04L9/302Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/304Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy based on error correction codes, e.g. McEliece
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • H04W12/033Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/065Continuous authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/24Key scheduling, i.e. generating round keys or sub-keys for block encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/04Large scale networks; Deep hierarchical networks
    • H04W84/042Public Land Mobile systems, e.g. cellular systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Test And Diagnosis Of Digital Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Measuring And Recording Apparatus For Diagnosis (AREA)
IL15567103A 2003-04-30 2003-04-30 Method and system of encryption decryption IL155671A (en)

Priority Applications (20)

Application Number Priority Date Filing Date Title
IL15567103A IL155671A (en) 2003-04-30 2003-04-30 Method and system of encryption decryption
PL13169371T PL2663019T3 (pl) 2003-04-30 2004-04-30 Urządzenie i sposób kryptoanalizy GSM
SI200432488T SI2663019T1 (sl) 2003-04-30 2004-04-30 Naprava in postopek za kriptoanalizo v GSM
US10/554,587 US8009826B2 (en) 2003-04-30 2004-04-30 Cryptoanalysis method and system
HUE13169371A HUE048094T2 (hu) 2003-04-30 2004-04-30 Eszköz és eljárás GSM titkosítás analízisre
EP13169371.5A EP2663019B1 (en) 2003-04-30 2004-04-30 GSM Cryptanalysis device and method
PL04730621T PL1623529T3 (pl) 2003-04-30 2004-04-30 Sposób i system analizy kryptograficznej szyfrowania GSM
EP04730621.2A EP1623529B1 (en) 2003-04-30 2004-04-30 Method and system for the cryptanalysis of GSM encryption
ES13169371T ES2777930T3 (es) 2003-04-30 2004-04-30 Método y sistema de criptoanálisis GSM
DK13169371.5T DK2663019T3 (da) 2003-04-30 2004-04-30 Anordning og fremgangsmåde til GSM-krypteringsanalyse
PCT/IL2004/000364 WO2004098112A2 (en) 2003-04-30 2004-04-30 Cryptoanalysis method and system
US13/184,775 US8295477B2 (en) 2003-04-30 2011-07-18 Cryptanalysis method and system
US13/623,277 US9038192B2 (en) 2003-04-30 2012-09-20 Cryptanalysis method and system
CY20131100743T CY1114390T1 (el) 2003-04-30 2013-08-29 Μεθοδος και συστημα κρυπταναλυσης της κυπτογραφησης gsm
US14/711,804 US9634832B2 (en) 2003-04-30 2015-05-14 Cryptanalysis method and system
US15/465,629 US9887972B2 (en) 2003-04-30 2017-03-22 Cryptanalysis method and system
US15/859,795 US10447666B2 (en) 2003-04-30 2018-01-02 Cryptanalysis method and system
US16/566,917 US10924462B2 (en) 2003-04-30 2019-09-11 Cryptanalysis method and system
CY20201100203T CY1122836T1 (el) 2003-04-30 2020-03-06 Συσκευη και μεθοδος κρυπταναλυσης gsμ
US17/149,773 US20210367931A1 (en) 2003-04-30 2021-01-15 Cryptanalysis Method and System

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
IL15567103A IL155671A (en) 2003-04-30 2003-04-30 Method and system of encryption decryption

Publications (2)

Publication Number Publication Date
IL155671A0 IL155671A0 (en) 2004-05-12
IL155671A true IL155671A (en) 2004-12-15

Family

ID=33397642

Family Applications (1)

Application Number Title Priority Date Filing Date
IL15567103A IL155671A (en) 2003-04-30 2003-04-30 Method and system of encryption decryption

Country Status (10)

Country Link
US (8) US8009826B2 (es)
EP (2) EP2663019B1 (es)
CY (2) CY1114390T1 (es)
DK (1) DK2663019T3 (es)
ES (1) ES2777930T3 (es)
HU (1) HUE048094T2 (es)
IL (1) IL155671A (es)
PL (2) PL1623529T3 (es)
SI (1) SI2663019T1 (es)
WO (1) WO2004098112A2 (es)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009090432A2 (en) * 2008-01-17 2009-07-23 Vodafone Group Plc Improving security in telecommunications systems
CN101252785B (zh) * 2008-03-21 2012-05-23 华为技术有限公司 无线通信的方法、系统及基站
EP2337387A1 (en) * 2009-12-18 2011-06-22 NetHawk Oyj Interception and control of ongoing radio connections through interposition and impersonation of a mobile device and cellular radio system
FR2960366A1 (fr) * 2010-05-20 2011-11-25 Ingenico Sa Procede d’obtention de cles de chiffrement, terminal, serveur, et produits programmes d’ordinateurs correspondants
US9356785B2 (en) * 2011-02-15 2016-05-31 Blackberry Limited Method and system for security enhancement for mobile communications
US8165618B1 (en) 2011-02-24 2012-04-24 Research In Motion Limited Methods and systems for slow associated control channel signaling
US9262639B2 (en) * 2013-01-09 2016-02-16 Cisco Technology Inc. Plaintext injection attack protection
EP3200390B1 (en) * 2014-09-25 2019-10-30 Nec Corporation Analysis system, analysis device, analysis method, and storage medium having analysis program recorded therein
WO2017096599A1 (zh) * 2015-12-10 2017-06-15 深圳市大疆创新科技有限公司 安全通信系统、方法及装置
US11265300B1 (en) * 2018-12-29 2022-03-01 Whatsapp Llc Methods and systems for transmitting anonymized information
CN112039654A (zh) * 2020-08-26 2020-12-04 上海电力大学 一种抵御中间人攻击的电表数据安全采集方法

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5778074A (en) * 1995-06-29 1998-07-07 Teledyne Industries, Inc. Methods for generating variable S-boxes from arbitrary keys of arbitrary length including methods which allow rapid key changes
US5809140A (en) * 1996-10-15 1998-09-15 Bell Communications Research, Inc. Session key distribution using smart cards
CN1157020C (zh) * 1997-04-23 2004-07-07 松下电器产业株式会社 提高了安全性的密码处理装置
US6560338B1 (en) * 1998-08-28 2003-05-06 Qualcomm Incorporated Limiting delays associated with the generation of encryption stream ciphers
US7113600B1 (en) * 1999-11-12 2006-09-26 Telefonaktiebolaget Lm Ericsson (Publ) Base transceiver station automatic encryption handling
US20010031050A1 (en) * 2000-02-14 2001-10-18 Lateca Computer Inc. N.V. Key generator
WO2001089253A1 (en) * 2000-05-18 2001-11-22 Ico Services Ltd. Connection authentication in a mobile network
US20030012372A1 (en) * 2001-04-25 2003-01-16 Cheng Siu Lung System and method for joint encryption and error-correcting coding

Also Published As

Publication number Publication date
EP1623529B1 (en) 2013-05-29
US20150244519A1 (en) 2015-08-27
US9887972B2 (en) 2018-02-06
WO2004098112A2 (en) 2004-11-11
US20200112547A1 (en) 2020-04-09
US20070147621A1 (en) 2007-06-28
US8009826B2 (en) 2011-08-30
EP2663019A2 (en) 2013-11-13
HUE048094T2 (hu) 2020-05-28
US8295477B2 (en) 2012-10-23
US10447666B2 (en) 2019-10-15
US9634832B2 (en) 2017-04-25
EP1623529A2 (en) 2006-02-08
DK2663019T3 (da) 2020-03-16
ES2777930T3 (es) 2020-08-06
PL2663019T3 (pl) 2020-06-29
PL1623529T3 (pl) 2013-11-29
EP2663019B1 (en) 2019-12-18
US9038192B2 (en) 2015-05-19
US20170195301A1 (en) 2017-07-06
EP1623529A4 (en) 2011-08-31
US20110280393A1 (en) 2011-11-17
US20210367931A1 (en) 2021-11-25
US20190028446A1 (en) 2019-01-24
US20130083918A1 (en) 2013-04-04
US10924462B2 (en) 2021-02-16
WO2004098112A3 (en) 2005-01-13
SI2663019T1 (sl) 2020-04-30
EP2663019A3 (en) 2017-07-19
CY1114390T1 (el) 2016-08-31
IL155671A0 (en) 2004-05-12
CY1122836T1 (el) 2021-05-05

Similar Documents

Publication Publication Date Title
US10924462B2 (en) Cryptanalysis method and system
Barkan et al. Instant ciphertext-only cryptanalysis of GSM encrypted communication
Barkan et al. Instant ciphertext-only cryptanalysis of GSM encrypted communication
KR101387799B1 (ko) 메시지 인증 방법
Lo et al. SMSSec: An end-to-end protocol for secure SMS
Rupprecht et al. Call me maybe: Eavesdropping encrypted {LTE} calls with {ReVoLTE}
US20200021566A1 (en) Dynamic encryption method
EP1685738B1 (en) Method, apparatus and network for authentication of a wireless communication using expiration marker
Cattaneo et al. Security Issues and Attacks on the GSM Standard: a Review.
Hwang et al. On the security of an enhanced UMTS authentication and key agreement protocol
Cattaneo et al. A review of security attacks on the GSM standard
KR101150577B1 (ko) 크립토싱크 생성 방법
Junaid et al. Per packet authentication for ieee 802.11 wireless lan
Okunbor Software implementation of LSFR-based stream ciphers for GSM cryptosystems
Saxena et al. An enhanced NPA protocol for secure communications in GSM network
Haddad et al. SEPS-AKA: A secure evolved packet system authentication and key agreement scheme for LTE-A networks
Olawski Security in the GSM network
van den Broek Mobile communication security
Fayed A security coprocessor for next generation IP telephony: architecture, abstraction, and strategies
Ciornei et al. Gsm security-attacks and protection methods (II)
Alzaabi New Cryptanalysis and Modelling for Wireless Networking
Hendi Enhanced the security of GSM (Global system for mobile)
Barkan et al. On the Security of the GSM Cellular Network
Al-Tarawneh et al. GSM Authentication Algorithm ‘COMP128’

Legal Events

Date Code Title Description
FF Patent granted
MM9K Patent not in force due to non-payment of renewal fees
NE Application for restoration - patent lapsed through non-payment of renewal fees (section 60, patents law, 5727-1967)
KB Patent renewed
NP Permission for amending the patent specification granted (section 66, patents law 1967)
KB Patent renewed