Title of article
An analysis of the 3gpp-MAC scheme
Author/Authors
Knudsen، نويسنده , , Lars R. and Mitchell، نويسنده , , Chris J.، نويسنده ,
Issue Information
روزنامه با شماره پیاپی سال 2001
Pages
10
From page
346
To page
355
Abstract
Key recovery attacks are described on the 3gpp-MAC scheme, proposed for inclusion in the 3gpp specification. Three main attacks are given, all of which operate whether or not truncation is applied to the MAC value. The first type of attack uses a large number of ‘chosen MACs’, the second type of attack a large number of ‘known MACs’, whereas the third attack requires a large number of MAC verifications, but very few known MACs and no chosen MACs.
Journal title
Electronic Notes in Discrete Mathematics
Serial Year
2001
Journal title
Electronic Notes in Discrete Mathematics
Record number
1453025
Link To Document