Abstract
KASUMI is a block cipher which has been adopted as a standard of 3GPP. In this paper, we study the pseudorandomness of idealized KASUMI type permutations for adaptive adversaries. We show that
-
the four round version is pseudorandom and
-
the six round version is super-pseudorandom.
See [5] for a long version. Most of the proofs are omitted in this proceedings version.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
http://www.3gpp.org/.
3GPP TS 35.202 v 3.1.1. Specification of the 3GPP confidentiality and integrity algorithms, Document 2: KASUMI specification. Available at http://www.3gpp.org/tb/other/algorithms.htm.
Evaluation report (version 2.0). Specification of the 3GPP confidentiality and integrity algorithms, Report on the evaluation of 3GPP confidentiality and integrity algorithms. Available at http://www.3gpp.org/tb/other/algorithms.htm.
M. Blunden and A. Escott. Related key attacks on reduced round KASUMI. Fast Software Encryption, FSE 2001, LNCS 2355, pp. 277–285, Springer-Verlag, 2002.
T. Iwata, T. Yagi, and K. Kurosawa. On the pseudorandomness of KASUMI type permutations. A long version of this paper. Available from the authors and Cryptology ePrint Archive, http://eprint.iacr.org/.
J. S. Kang, S. U. Shin, D. Hong, and O. Yi. Provable security of KASUMI and 3GPP encryption mode f8. Advances in Cryptology — ASIACRYPT 2001, LNCS 2248, pp. 255–271, Springer-Verlag, 2001.
J. S. Kang, O. Yi, D. Hong, and H. Cho. Pseudorandomness of MISTY-type transformations and the block cipher KASUMI. Information Security and Privacy, The 6th Australasian Conference, ACISP 2001, LNCS 2119, pp. 60–73, Springer-Verlag, 2001.
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Comput., vol. 17, no. 2, pp. 373–386, April 1988.
M. Matsui. New structure of block ciphers with provable security against differential and linear cryptanalysis. Fast Software Encryption, FSE’ 96, LNCS 1039, pp. 206–218, Springer-Verlag.
M. Matsui. New block encryption algorithm MISTY. Fast Software Encryption, FSE’ 97, LNCS 1267, pp. 54–68, Springer-Verlag.
K. Sakurai and Y. Zheng. On non-pseudorandomness from block ciphers with provable immunity against linear cryptanalysis. IEICE Trans. Fundamentals, vol. E80-A, no. 1, pp. 19–24, April 1997.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Iwata, T., Yagi, T., Kurosawa, K. (2003). On the Pseudorandomness of KASUMI Type Permutations. In: Safavi-Naini, R., Seberry, J. (eds) Information Security and Privacy. ACISP 2003. Lecture Notes in Computer Science, vol 2727. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45067-X_12
Download citation
DOI: https://doi.org/10.1007/3-540-45067-X_12
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-40515-3
Online ISBN: 978-3-540-45067-2
eBook Packages: Springer Book Archive