Abstract
This paper analyzes the Telecommunications Industry Association's Cellular Message Encryption Algorithm (CMEA), which is used for confidentiality of the control channel in the most recent American digital cellular telephony systems. We describe an attack on CMEA which requires 40–80 known plaintexts, has time complexity about 224–232, and finishes in minutes or hours of computation on a standard workstation. This demonstrates that CMEA is deeply flawed.
Chapter PDF
References
M. Bannert, “Cryptanalysis of the Cellular Message Encryption Algorithm,” unpublished manuscript, 1 May 1997.
J.P. Barlow, “Decrypting the Puzzle Palace,” Communications of the ACM, July 1992.
R. Mechaley, Speaker, Digital telephony and cryptography policy session. The Third Conference on Computers, Freedom and Privacy, Burlingame, CA, 1993, Bruce Koball, General Chair.
FCC Wireless Telecommunications Bureau, “FCC-WTB Information of Cellular Fraud,” http://www.fcc.gov/wtb/cellfrd.html, Feb 1997.
J. Hillyard, personal communication, 21 May 1997.
Nokia Mobile Phones, “Nokia Announces Anti-Fraud Protection Option for All Models Marketed in 1996,” 5 Jan 1996, Tampa Fla., http://www.nokia.com/news/news_htmls/nmp_960105b.html, press release.
J. A. Reeds III, “Cryptosystem for Cellular Telephony,” U.S. Patent 5,159,634, Sep 1991.
TIA IS-54 Appendix A, “Dual-mode Cellular System: Authentication, Message Encryption, Voice Privacy Mask Generation, Shared Secret Data Generation, A-Key Verification, and Test Data,” Feb 1992, Rev B.
TIA TR45.0.A, “Common Cryptographic Algorithms,” June 1995, Rev B.
“Summary of Testimony of Thomas E. Wheeler,” Oversight Hearing on Cellular Privacy, 5 Feb 1997, House Commerce Committee, Subcommittee on Telecommunications, Trade, and Consumer Protection, http://www.house.gov/commerce/telecom/hearings/020597/wheeler.pdf
D. Wagner, B. Schneier, J. Kelsey, “Cryptanalysis of ORYX,” unpublished manuscript, 4 May 1997.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1997 Springer-Verlag
About this paper
Cite this paper
Wagner, D., Schneier, B., Kelsey, J. (1997). Cryptanalysis of the cellular message encryption algorithm. In: Kaliski, B.S. (eds) Advances in Cryptology — CRYPTO '97. CRYPTO 1997. Lecture Notes in Computer Science, vol 1294. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0052260
Download citation
DOI: https://doi.org/10.1007/BFb0052260
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-63384-6
Online ISBN: 978-3-540-69528-8
eBook Packages: Springer Book Archive