Fault injection attack on A5/3

Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

In this paper, we propose a fault injection attack on A5/3 used in GSM. This attack is based on the fault assumption in [9]. That is, it is assumed that we can decrease the number of rounds in block cipher KASUMI of A5/3 by injecting some faults. With small number of fault injections, we can recover the session key of A5/3 supporting a 64-bit session key. This is the first known cryptanalytic result on A5/3 so far.

Original languageEnglish
Title of host publicationProceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011
Pages300-303
Number of pages4
DOIs
Publication statusPublished - 2011 Aug 18
Event9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011 - Busan, Korea, Republic of
Duration: 2011 May 262011 May 28

Other

Other9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011
CountryKorea, Republic of
CityBusan
Period11/5/2611/5/28

Fingerprint

Global system for mobile communications

Keywords

  • A5/3
  • Cryptanalysis
  • Fault injection attack
  • GSM

ASJC Scopus subject areas

  • Computer Science Applications

Cite this

Jeong, K., Lee, Y., Sung, J., & Hong, S. (2011). Fault injection attack on A5/3. In Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011 (pp. 300-303). [5951922] https://doi.org/10.1109/ISPA.2011.17

Fault injection attack on A5/3. / Jeong, Kitae; Lee, Yuseop; Sung, Jaechul; Hong, Seokhie.

Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011. 2011. p. 300-303 5951922.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jeong, K, Lee, Y, Sung, J & Hong, S 2011, Fault injection attack on A5/3. in Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011., 5951922, pp. 300-303, 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011, Busan, Korea, Republic of, 11/5/26. https://doi.org/10.1109/ISPA.2011.17
Jeong K, Lee Y, Sung J, Hong S. Fault injection attack on A5/3. In Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011. 2011. p. 300-303. 5951922 https://doi.org/10.1109/ISPA.2011.17
Jeong, Kitae ; Lee, Yuseop ; Sung, Jaechul ; Hong, Seokhie. / Fault injection attack on A5/3. Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011. 2011. pp. 300-303
@inproceedings{4e2db4c42c08461b9ba0fd03446f0e1f,
title = "Fault injection attack on A5/3",
abstract = "In this paper, we propose a fault injection attack on A5/3 used in GSM. This attack is based on the fault assumption in [9]. That is, it is assumed that we can decrease the number of rounds in block cipher KASUMI of A5/3 by injecting some faults. With small number of fault injections, we can recover the session key of A5/3 supporting a 64-bit session key. This is the first known cryptanalytic result on A5/3 so far.",
keywords = "A5/3, Cryptanalysis, Fault injection attack, GSM",
author = "Kitae Jeong and Yuseop Lee and Jaechul Sung and Seokhie Hong",
year = "2011",
month = "8",
day = "18",
doi = "10.1109/ISPA.2011.17",
language = "English",
isbn = "9780769544281",
pages = "300--303",
booktitle = "Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011",

}

TY - GEN

T1 - Fault injection attack on A5/3

AU - Jeong, Kitae

AU - Lee, Yuseop

AU - Sung, Jaechul

AU - Hong, Seokhie

PY - 2011/8/18

Y1 - 2011/8/18

N2 - In this paper, we propose a fault injection attack on A5/3 used in GSM. This attack is based on the fault assumption in [9]. That is, it is assumed that we can decrease the number of rounds in block cipher KASUMI of A5/3 by injecting some faults. With small number of fault injections, we can recover the session key of A5/3 supporting a 64-bit session key. This is the first known cryptanalytic result on A5/3 so far.

AB - In this paper, we propose a fault injection attack on A5/3 used in GSM. This attack is based on the fault assumption in [9]. That is, it is assumed that we can decrease the number of rounds in block cipher KASUMI of A5/3 by injecting some faults. With small number of fault injections, we can recover the session key of A5/3 supporting a 64-bit session key. This is the first known cryptanalytic result on A5/3 so far.

KW - A5/3

KW - Cryptanalysis

KW - Fault injection attack

KW - GSM

UR - http://www.scopus.com/inward/record.url?scp=80051650475&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=80051650475&partnerID=8YFLogxK

U2 - 10.1109/ISPA.2011.17

DO - 10.1109/ISPA.2011.17

M3 - Conference contribution

AN - SCOPUS:80051650475

SN - 9780769544281

SP - 300

EP - 303

BT - Proceedings - 9th IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2011

ER -