Paper 2011/268

Birthday Forgery Attack on 128-EIA3 Version 1.5

Raja Zeshan Haider

Abstract

128-EIA3 is an integrity algorithm considered for adoption as a third integrity algorithm by European Telecommunication Standard Institute (ETSI) for 4th generation of GSM networks.128-EIA3 is vul- nerable to birthday forgery attack. Birthday forgery attack requires minimum 2^16 known message-MAC pairs for nding collision in 128-EIA3. 128-EIA3 is susceptible to internal collision of its universal hash function and external collision of its Xoring transformation. Birthday forgery attack on 128-EIA3 allows message forgery with success probability greater than 1/2^32.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
Message Authentication Code
Contact author(s)
zeshanjalip @ hotmail com
History
2011-05-28: received
Short URL
https://ia.cr/2011/268
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2011/268,
      author = {Raja Zeshan Haider},
      title = {Birthday Forgery Attack on 128-{EIA3} Version 1.5},
      howpublished = {Cryptology {ePrint} Archive, Paper 2011/268},
      year = {2011},
      url = {https://eprint.iacr.org/2011/268}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.