Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks 2013
DOI: 10.1145/2462096.2462110
|View full text |Cite
|
Sign up to set email alerts
|

The weakness of integrity protection for LTE

Abstract: In this paper, we concentrate on the security issues of the integrity protection of LTE and present two different forgery attacks. For the first attack, referred to as a linear forgery attack, EIA1 and EIA3, two integrity protection algorithms of LTE, are insecure if the initial value (IV) can be repeated twice during the life cycle of an integrity key (IK). Because of the linearity of EIA1 and EIA3, given two valid Message Authentication Codes (MACs) our algorithm can forge up to 2 32 valid MACs. Thus, the pr… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 17 publications
(11 citation statements)
references
References 11 publications
0
11
0
Order By: Relevance
“…Because two constructions are AXU MACs, they are resistant against most attacks, except cycling attack and linear forgery attack . We only consider these two attacks in the remaining part of this section.…”
Section: Two Constructionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Because two constructions are AXU MACs, they are resistant against most attacks, except cycling attack and linear forgery attack . We only consider these two attacks in the remaining part of this section.…”
Section: Two Constructionsmentioning
confidence: 99%
“…The experiment shows our constructions have overwhelming advantage in both efficiency and security compared with EIA1. One, the same platform, both of our new MACs are much faster than EIA1, and our constructions are resistant to the cycling attack and the linear forgery attack ; two, attacks that EIA1 suffers.…”
Section: Introductionmentioning
confidence: 99%
“…For these services, lack of availability would be disastrous. While attacks against confidentiality & integrity are feasible and have been studied [7], [8], prior research has extensively examined ways to launch DoS attacks [5], [9], [10] against the network. Popular variants are partial/full flooding and jamming [5].…”
Section: Fig 1: Lte Network Architecturementioning
confidence: 99%
“…A malicious adversary could also actively track subscribers by observing the temporary identities consecutively assigned to UE devices. According to [8], authentication in LTE is not mutual. In other words, an eNodeB will authenticate a UE device, but not vice versa.…”
Section: ) Attacks Against Confidentialitymentioning
confidence: 99%
See 1 more Smart Citation