Ruilin LI, Jiao HU, Chaojing TANG. Collision analysis of the GMR-2 cipher used in the satellite phone[J]. Journal on Communications, 2018, 39(2): 88-95.
DOI:
Ruilin LI, Jiao HU, Chaojing TANG. Collision analysis of the GMR-2 cipher used in the satellite phone[J]. Journal on Communications, 2018, 39(2): 88-95. DOI: 10.11959/j.issn.1000-436x.2018026.
Collision analysis of the GMR-2 cipher used in the satellite phone
A collision property analysis of the GMR-2 cipher used in the satellite phone was presented.By using the F-component as a bridge
the link between the difference of the key byte and the collision of the output ofFas well as the link between the collision of the output of F and the collision of keystream byte were analyzed
which finally revealed the relationship between the difference of the original key byte and the keystream collision.The theoretical analysis showed that for a random frame number
a special chosen key pair could lead to a keystream collision with a high probability
when the key pair has only one byte difference in which the most significant 4 bit of the difference was equal to the last significant 4 bit.The experimental result shows that the keystream collision probability is 2
−8.248
which is far higher than the ideal collision probability 2
−120
.This proves once again
that there exists serious potential security hazards in the GMR-2 cipher.
WU Y G , GU T L , XU Z B . BDD attack on SNOW 3G encryption algorithm [J ] . Journal of Guilin University of Electronic Technology , 2016 , 36 ( 3 ): 199 - 203 .
BARKAN P , BIHAM E , KELLER N . Instant cipher-text only cryptanalysis of GSM encrypted communication [J ] . Journal of Cryptology , 2008 , 21 ( 3 ): 392 - 429 .
BIRYUKOV A , SHAMIR A , WAGNER D . Real time cryptanalysis of A5/1 on a PC [M ] // Fast Software Encryption,Springer Berlin Heidelberg , 2000 : 1 - 18 .
DUNKELMAN O , KELLER N , SHAMIR A . A practical-time attack on the A5/3 cryptosystem used in third generation GSM telephony [C ] // Icar Crgptology Eprint Archive . 2010 : 393 - 410 .
WU H , HUANG T , NGUYEN P , et al . Differential attacks against stream cipher ZUC [C ] // International Conference on the Theory and Application of Cryptology and Information Security . 2012 : 262 - 277 .
ZHANG B , XU C , MEIER W . Fast correlation attacks over extension fields,large-unit linear approximation and cryptanalysis of SNOW 2.0 [C ] // Cryptology Conference . 2015 : 643 - 662 .
ZHOU C , FENG X , LIN D . The Initialization stage analysis of ZUC v1.5 [C ] // Cryptology and Network Security . 2011 : 40 - 53 .
DRIESSEN B , HUND R , WILLEMS C , et al . Don't trust satellite phones:a security analysis of two satphone standards [C ] // Security and Privacy (SP) . 2012 : 128 - 142 .
DRIESSEN B , HUND R , WILLEMS C , et al . An experimental security analysis of two satphone standards [J ] . ACM Transactions on Information & System Security , 2013 , 16 ( 3 ): 1 - 30 .
LI R , LI H , LI C , et al . A low data complexity attack on the GMR-2 Cipher Used in the Satellite Phones [C ] // FSE . 2013 : 485 - 501 .