Notifications
Clear all

A5/3 encryption

4 Posts
2 Users
0 Reactions
616 Views
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
Topic starter  

Who did use the TAMARIN prover to test the SRES Ki response at LTE authentication towards EPS?


   
Quote
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
 

Who did use the TAMARIN prover to test the SRES Ki response at LTE authentication towards EPS?

I know of Tamarin prover and its capability, automation, supports the verification of stateful protocols, supply supporting lemmata etc., but not used it personally.

How do you envisage applying it?

SRES Ki Kasme.png - https://www.dropbox.com/s/ymt30yycyhr68uq/SRES%20Ki%20Kasme.png

EPS Kasme.png - https://www.dropbox.com/s/qkh4nemyyh39010/EPS%20Kasme.png

Images from F.B. Degefa et al., Performance and security enhanced authentication and key agreement protocol for SAE/LTE network, Computer Networks (2015)

   
ReplyQuote
(@tinybrain)
Reputable Member
Joined: 9 years ago
Posts: 354
Topic starter  

Cryptoanalysis is complex , not possible to explain in words. Sorry for that.

Is there a cryptographer who can respond?


   
ReplyQuote
(@trewmte)
Noble Member
Joined: 19 years ago
Posts: 1877
 

Cryptoanalysis is complex , not possible to explain in words.

OK, no worries TinyBrain.

Is there a cryptographer who can respond?

If you cannot explain in words, can you explain in crypto-analysis terms, such as a security protocol or in terms of constraint reduction relation { ( Γ, r ( Γ )) | Γ ∈ dom (r )}

or maybe as

Step 1 rule 1. simplify rule 2. induction
Chosen Rule simplify
Step 2 rule 1. Client 1(S, k ) .o #i rule 2. !KU(h(k))@#vk
Chosen Rule Client 1(S, k) .o #i
Step 3 rule 1. !KU(∼ k)@#vk.1 rule 2. !KU(h(∼ k))@#vk

An example on information collected from e.g. tamarin prover

?


   
ReplyQuote
Share: