Paper 2011/268
Birthday Forgery Attack on 128-EIA3 Version 1.5
Raja Zeshan Haider
Abstract
128-EIA3 is an integrity algorithm considered for adoption as a third integrity algorithm by European Telecommunication Standard Institute (ETSI) for 4th generation of GSM networks.128-EIA3 is vul- nerable to birthday forgery attack. Birthday forgery attack requires minimum 2^16 known message-MAC pairs for nding collision in 128-EIA3. 128-EIA3 is susceptible to internal collision of its universal hash function and external collision of its Xoring transformation. Birthday forgery attack on 128-EIA3 allows message forgery with success probability greater than 1/2^32.
Metadata
- Available format(s)
- Category
- Secret-key cryptography
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- Message Authentication Code
- Contact author(s)
- zeshanjalip @ hotmail com
- History
- 2011-05-28: received
- Short URL
- https://ia.cr/2011/268
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2011/268, author = {Raja Zeshan Haider}, title = {Birthday Forgery Attack on 128-{EIA3} Version 1.5}, howpublished = {Cryptology {ePrint} Archive, Paper 2011/268}, year = {2011}, url = {https://eprint.iacr.org/2011/268} }