[Resource Topic] 2011/268: Birthday Forgery Attack on 128-EIA3 Version 1.5

Welcome to the resource topic for 2011/268

Title:
Birthday Forgery Attack on 128-EIA3 Version 1.5

Authors: Raja Zeshan Haider

Abstract:

128-EIA3 is an integrity algorithm considered for adoption as a third integrity algorithm by European Telecommunication Standard Institute (ETSI) for 4th generation of GSM networks.128-EIA3 is vul- nerable to birthday forgery attack. Birthday forgery attack requires minimum 2^16 known message-MAC pairs for nding collision in 128-EIA3. 128-EIA3 is susceptible to internal collision of its universal hash function and external collision of its Xoring transformation. Birthday forgery attack on 128-EIA3 allows message forgery with success probability greater than 1/2^32.

ePrint: https://eprint.iacr.org/2011/268

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .