On related-key attacks and KASUMI: the case of a5/3

  • Authors:
  • Phuong Ha Nguyen;Matthew J. B. Robshaw;Huaxiong Wang

  • Affiliations:
  • Nanyang Technological University, Singapore;Applied Cryptography Group, Orange Labs, France;Nanyang Technological University, Singapore

  • Venue:
  • INDOCRYPT'11 Proceedings of the 12th international conference on Cryptology in India
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Due to its widespread deployment in mobile telephony, the block cipher KASUMI is a prominent target for cryptanalysts. While the cipher offers excellent resistance to differential and linear cryptanalysis, in the related-key model there have been several impressive cryptanalytic results. In this paper we revisit these related-key attacks and highlight a small, but important, detail in the specification of KASUMI for the algorithm A5/3; namely that a 64- and not a 128-bit session key is used. We show that existing related-key attacks on KASUMI in the literature are (negatively) impacted by this feature and we provide evidence that repairing these attacks will be difficult.