Loading...
Please wait, while we are loading the content...
Similar Documents
A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA 3 ( updated version )
| Content Provider | Semantic Scholar |
|---|---|
| Author | Fuhr, Thomas Gilbert, Henri Reinhard, Jean-René Videau, Marion |
| Copyright Year | 2010 |
| Abstract | In this note we show that the message authentication code 128-EIA3 considered for adoption as a third integrity algorithm in the emerging mobile standard LTE is vulnerable to a simple existential forgery attack. This attack allows, given any message and the associated MAC value under an unknown integrity key and an initial vector, to predict the MAC value of a related message under the same key and the same initial vector with a success probability 1/2. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | https://eprint.iacr.org/2010/618.pdf |
| Alternate Webpage(s) | http://eprint.iacr.org/2010/618.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |