KASUMI is a blockcipher that forms the heart of the 3GPP confidentiality and integrity algorithms. In this paper, we study the security of the five-round KASUMI type permutations, and derive a highly non-trivial security bound against adversaries with adaptive chosen plaintext and chosen ciphertext attacks. To derive our security bound, we heavily use the tools from graph theory. However the result does not show its super-pseudorandomness, this gives us a strong evidence that the design of KASUMI is sound.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Tetsu IWATA, Tohru YAGI, Kaoru KUROSAWA, "Security of the Five-Round KASUMI Type Permutation" in IEICE TRANSACTIONS on Fundamentals,
vol. E91-A, no. 1, pp. 30-38, January 2008, doi: 10.1093/ietfec/e91-a.1.30.
Abstract: KASUMI is a blockcipher that forms the heart of the 3GPP confidentiality and integrity algorithms. In this paper, we study the security of the five-round KASUMI type permutations, and derive a highly non-trivial security bound against adversaries with adaptive chosen plaintext and chosen ciphertext attacks. To derive our security bound, we heavily use the tools from graph theory. However the result does not show its super-pseudorandomness, this gives us a strong evidence that the design of KASUMI is sound.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1093/ietfec/e91-a.1.30/_p
Copy
@ARTICLE{e91-a_1_30,
author={Tetsu IWATA, Tohru YAGI, Kaoru KUROSAWA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Security of the Five-Round KASUMI Type Permutation},
year={2008},
volume={E91-A},
number={1},
pages={30-38},
abstract={KASUMI is a blockcipher that forms the heart of the 3GPP confidentiality and integrity algorithms. In this paper, we study the security of the five-round KASUMI type permutations, and derive a highly non-trivial security bound against adversaries with adaptive chosen plaintext and chosen ciphertext attacks. To derive our security bound, we heavily use the tools from graph theory. However the result does not show its super-pseudorandomness, this gives us a strong evidence that the design of KASUMI is sound.},
keywords={},
doi={10.1093/ietfec/e91-a.1.30},
ISSN={1745-1337},
month={January},}
Copy
TY - JOUR
TI - Security of the Five-Round KASUMI Type Permutation
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 30
EP - 38
AU - Tetsu IWATA
AU - Tohru YAGI
AU - Kaoru KUROSAWA
PY - 2008
DO - 10.1093/ietfec/e91-a.1.30
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E91-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2008
AB - KASUMI is a blockcipher that forms the heart of the 3GPP confidentiality and integrity algorithms. In this paper, we study the security of the five-round KASUMI type permutations, and derive a highly non-trivial security bound against adversaries with adaptive chosen plaintext and chosen ciphertext attacks. To derive our security bound, we heavily use the tools from graph theory. However the result does not show its super-pseudorandomness, this gives us a strong evidence that the design of KASUMI is sound.
ER -