Abstract
This paper discusses the design and implementation of the Confidentiality and Integrity algorithms, which have been standardized by the 3- rdGeneration Partnership Project. Both algorithms use a modified version of the MISTY scheme, named KASUMI, as a basic cryptographic engine. Various architectural approaches have been examined and implemented in different hardware platforms (FPGAs, ASICs) providing useful information regarding the required area and the design throughput.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ETSI/SAGE. Æ’8 and Æ’9 specification. Specification of the 3GPP Confidentiality and Integrity Algorithms Document 1, ETSI/SAGE, September 2000.
ETSI/SAGE. KASUMI specification. Specification of the 3GPP Confidentiality and Integrity Algorithms Document 2, ETSI/SAGE, December 1999.
G TS 33.102 V 3.1.0 3rd Generation Partnership Project. Technical Specification Group Services and System Aspects. 3G Security. Cryptographic Algorithm Requirements, December 1999.
Mitsuru Matsui: New block encryption algorithm MISTY. In Fast Software Encryption ’97, vol. 1267 of LNCS, pages 54–68. Springer-Verlag, 1997.
Xilinx Data Book.
Altera Data Book.
Synopsys Design Analyzer Reference Manual v.2000.11.
ETSI/SAGE. Implementors’ Test Data. Specification of the 3GPP Confidentiality and Integrity Algorithms Document 3, ETSI/SAGE, December 1999.
ISO/IEC 10116:1996: Information technology-Security techniques-Modes of operation for an n-bit block cipher algorithm.
ETSI/SAGE. 3GPP Standard Algorithms Task Force-Public Report-Security Algorithms Group of Experts (SAGE) Report on the Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms.
ISO/IEC 9797-1:1999 (E). Information technology-Security techniques-Message Authentication Codes (MACs)-Part 1.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Marinis, K., Moshopoulos, N.K., Karoubalis, F., Pekmestzi, K.Z. (2001). On the Hardware Implementation of the 3GPP Confidentiality and Integrity Algorithms. In: Davida, G.I., Frankel, Y. (eds) Information Security. ISC 2001. Lecture Notes in Computer Science, vol 2200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45439-X_17
Download citation
DOI: https://doi.org/10.1007/3-540-45439-X_17
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42662-2
Online ISBN: 978-3-540-45439-7
eBook Packages: Springer Book Archive