Cryptanalysis of the cellular authentication and voice encryption algorithm.
William MillanPraveen GauravaramPublished in: IEICE Electron. Express (2004)
Keyphrases
- encryption algorithm
- data encryption
- security analysis
- s box
- secret key
- pseudorandom
- encryption algorithms
- high security
- authentication scheme
- authentication protocol
- smart card
- public key
- encryption scheme
- user authentication
- security requirements
- signature scheme
- image encryption
- digital content
- ciphertext
- hash functions
- security mechanisms
- initial conditions
- key distribution
- efficient implementation