KASUMI
|
In cryptography, KASUMI, also termed A5/3, is a block cipher used in the confidentiality (f8) and integrity algorithms (f9) for 3GPP mobile communications. KASUMI was designed by the Security Algorithms Group of Experts (SAGE), part of the European standards body ETSI. Rather than invent a cipher from scratch, an existing algorithm, MISTY1, was selected by SAGE and slightly optimised for implementation in hardware. Hence, both MISTY1 and KASUMI are very similar — kasumi is the Japanese word for "misty" — and the cryptanalysis of one is likely to be readily adaptable to the other.
KASUMI has a block size of 64 bits and a key size of 128 bits. It is a Feistel cipher with eight rounds, and like MISTY1 and MISTY2, it has a recursive structure, with subcomponents also having a Feistel-like form.
In 2001, an impossible differential attack on six rounds of KASUMI was presented by Kühn (2001).
See also
References
- ETSI/SAGE, "KASUMI Specification, Part of the Specification of the 3GPP Confidentiality and Integrity Algorithms", 1999.
- Kühn, U. "Cryptanalysis of Reduced Round MISTY", EUROCRYPT 2001.
External links
- Article on KASUMI (and MISTY) in Mitsubishi Advance (PDF) (http://global.mitsubishielectric.com/pdf/advance/vol100/03Vol100_TR2.pdf)
Block ciphers edit (https://academickids.com:443/encyclopedia/index.php?title=Template:Block_ciphers&action=edit) |
Algorithms: 3-Way | AES | Akelarre | Blowfish | Camellia | CAST-128 | CAST-256 | CMEA | DEAL | DES | DES-X | FEAL | FOX | FROG | G-DES | GOST | ICE | IDEA | Iraqi | KASUMI | KHAZAD | Khufu and Khafre | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | MISTY1 | MMB | NewDES | RC2 | RC5 | RC6 | REDOC | Red Pike | S-1 | SAFER | SEED | Serpent | SHACAL | SHARK | Skipjack | Square | TEA | Triple DES | Twofish | XTEA |
Design: Feistel network | Key schedule | Product cipher | S-box | SPN Attacks: Brute force | Linear / Differential cryptanalysis | Mod n | XSL Standardisation: AES process | CRYPTREC | NESSIE Misc: Avalanche effect | Block size | IV | Key size | Modes of operation | Piling-up lemma | Weak key |