Notifications
Clear all

A5/3 encryption

4 Posts
2 Users
0 Likes
394 Views
(@tinybrain)
Posts: 354
Reputable Member
Topic starter
 

Who did use the TAMARIN prover to test the SRES Ki response at LTE authentication towards EPS?

 
Posted : 01/12/2018 7:21 pm
(@trewmte)
Posts: 1877
Noble Member
 

Who did use the TAMARIN prover to test the SRES Ki response at LTE authentication towards EPS?

I know of Tamarin prover and its capability, automation, supports the verification of stateful protocols, supply supporting lemmata etc., but not used it personally.

How do you envisage applying it?

SRES Ki Kasme.png - https://www.dropbox.com/s/ymt30yycyhr68uq/SRES%20Ki%20Kasme.png

EPS Kasme.png - https://www.dropbox.com/s/qkh4nemyyh39010/EPS%20Kasme.png

Images from F.B. Degefa et al., Performance and security enhanced authentication and key agreement protocol for SAE/LTE network, Computer Networks (2015)
 
Posted : 02/12/2018 11:07 am
(@tinybrain)
Posts: 354
Reputable Member
Topic starter
 

Cryptoanalysis is complex , not possible to explain in words. Sorry for that.

Is there a cryptographer who can respond?

 
Posted : 02/12/2018 4:14 pm
(@trewmte)
Posts: 1877
Noble Member
 

Cryptoanalysis is complex , not possible to explain in words.

OK, no worries TinyBrain.

Is there a cryptographer who can respond?

If you cannot explain in words, can you explain in crypto-analysis terms, such as a security protocol or in terms of constraint reduction relation { ( Γ, r ( Γ )) | Γ ∈ dom (r )}

or maybe as

Step 1 rule 1. simplify rule 2. induction
Chosen Rule simplify
Step 2 rule 1. Client 1(S, k ) .o #i rule 2. !KU(h(k))@#vk
Chosen Rule Client 1(S, k) .o #i
Step 3 rule 1. !KU(∼ k)@#vk.1 rule 2. !KU(h(∼ k))@#vk

An example on information collected from e.g. tamarin prover

?

 
Posted : 02/12/2018 5:05 pm
Share: