KASUMI

KASUMI is a block cipher used in UMTS, GSM, and GPRS mobile communications systems. In UMTS, KASUMI is used in the confidentiality (f8) and integrity algorithms (f9) with names UEA1 and UIA1, respectively.[1] In GSM, KASUMI is used in the A5/3 key stream generator and in GPRS in the GEA3 key stream generator. KASUMI was designed for 3GPP to be used in UMTS security system by the Security Algorithms Group of Experts (SAGE), a part of the European standards body ETSI.[2] Because of schedule pressures in 3GPP standardization, instead of developing a new cipher, SAGE agreed with 3GPP technical specification group (TSG) for system aspects of 3G security (SA3) to base the development on an existing algorithm that had already undergone some evaluation.[2] They chose the cipher algorithm MISTY1 developed[3] and patented[4] by Mitsubishi Electric Corporation. The original algorithm was slightly modified for easier hardware implementation and to meet other requirements set for 3G mobile communications security.


References in zbMATH (referenced in 19 articles , 1 standard article )

Showing results 1 to 19 of 19.
Sorted by year (citations)

  1. Dunkelman, Orr; Keller, Nathan; Shamir, Adi: A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony (2010)
  2. Kanso, Ali A.: Encryption system with variable number of registers (2010)
  3. Nachef, Valérie; Patarin, Jacques; Treger, Joana: Generic attacks on misty schemes (2010)
  4. Yap, Huihui; Khoo, Khoongming; Poschmann, Axel: Parallelizing the Camellia and SMS4 block ciphers (2010)
  5. Balderas-Contreras, Tomas; Cumplido, Rene; Feregrino-Uribe, Claudia: On the design and implementation of a RISC processor extension for the KASUMI encryption algorithm (2008)
  6. Choy, Jiali; Khoo, Khoongming: New applications of differential bounds of the SDS structure (2008)
  7. Sugio, Nobuyuki; Nambu, Shunichi; Kaneko, Toshinobu: A fast calculus for the linearizing attack and its application to an attack on KASUMI (2006)
  8. Biham, Eli; Dunkelman, Orr; Keller, Nathan: A related-key rectangle attack on the full KASUMI (2005)
  9. Iwata, Tetsu; Kurosawa, Kaoru: How to enhance the security of the 3GPP confidentiality and integrity algorithms (2005)
  10. Lee, Wonil; Sakurai, Kouichi; Hong, Seokhie; Lee, Sangjin: On the pseudorandomness of a modification of KASUMI type permutations (2005)
  11. Iwata, Tetsu; Kohno, Tadayoshi: New security proofs for the 3GPP confidentiality and integrity algorithms (2004)
  12. Biryukov, Alex; De Cannière, Christophe: Block ciphers and systems of quadratic equations. (2003)
  13. Biryukov, Alex; De Cannière, Christophe; Braeken, An; Preneel, Bart: A toolbox for cryptanalysis: Linear and affine equivalence algorithms (2003)
  14. Hong, Dowon; Kang, Ju-Sung; Preneel, Bart; Ryu, Heuisu: A concrete security analysis for 3GPP-MAC. (2003)
  15. Iwata, Tetsu; Kurosawa, Kaoru: On the correctness of security proofs for the 3GPP confidentiality and integrity algorithms (2003)
  16. Iwata, Tetsu; Yagi, Tohru; Kurosawa, Kaoru: On the pseudorandomness of KASUMI type permutations (2003)
  17. Blunden, Mark; Escott, Adrian: Related key attacks on reduced round KASUMI (2002)
  18. Satoh, Akashi; Morioka, Sumio: Small and high-speed hardware architectures for the 3GPP standard cipher KASUMI (2002)
  19. Vojvoda, Milan: A survey of security mechanisms in mobile communication systems (2002)