Fault injection attack on A5/3

Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

In this paper, we propose a fault injection attack on A5/3 used in GSM. This attack is based on the fault assumption in [9]. That is, it is assumed that we can decrease the number of rounds in block cipher KASUMI of A5/3 by injecting some faults. With small number of fault injections, we can recover the session key of A5/3 supporting a 64-bit session key. This is the first known cryptanalytic result on A5/3 so far.

Original languageEnglish
Title of host publicationProceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011
Pages300-303
Number of pages4
DOIs
Publication statusPublished - 2011 Aug 18
Event9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011 - Busan, Korea, Republic of
Duration: 2011 May 262011 May 28

Other

Other9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011
CountryKorea, Republic of
CityBusan
Period11/5/2611/5/28

    Fingerprint

Keywords

  • A5/3
  • Cryptanalysis
  • Fault injection attack
  • GSM

ASJC Scopus subject areas

  • Computer Science Applications

Cite this

Jeong, K., Lee, Y., Sung, J., & Hong, S. (2011). Fault injection attack on A5/3. In Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011 (pp. 300-303). [5951922] https://doi.org/10.1109/ISPA.2011.17