language-icon Old Web
English
Sign In

KASUMI

KASUMI is a block cipher used in UMTS, GSM, and GPRS mobile communications systems.In UMTS, KASUMI is used in the confidentiality (f8) and integrity algorithms (f9) with names UEA1 and UIA1, respectively.In GSM, KASUMI is used in the A5/3 key stream generator and in GPRS in the GEA3 key stream generator. KASUMI is a block cipher used in UMTS, GSM, and GPRS mobile communications systems.In UMTS, KASUMI is used in the confidentiality (f8) and integrity algorithms (f9) with names UEA1 and UIA1, respectively.In GSM, KASUMI is used in the A5/3 key stream generator and in GPRS in the GEA3 key stream generator. KASUMI was designed for 3GPP to be used in UMTS security system by the Security Algorithms Group of Experts(SAGE), a part of the European standards body ETSI.Because of schedule pressures in 3GPP standardization, instead of developing a new cipher, SAGE agreed with 3GPP technical specification group (TSG) for system aspects of 3G security (SA3) to base the developmenton an existing algorithm that had already undergone some evaluation.They chose the cipher algorithm MISTY1 developedand patentedby Mitsubishi Electric Corporation.The original algorithm was slightly modified for easier hardware implementation and tomeet other requirements set for 3G mobile communications security. KASUMI is named after the original algorithm MISTY1 — 霞み (hiragana かすみ, romaji kasumi) is the Japanese word for 'mist'. In January 2010, Orr Dunkelman, Nathan Keller and Adi Shamir released a paper showing that they could break Kasumi with a related-key attack and very modest computational resources; this attack is ineffective against MISTY1. KASUMI algorithm is specified in a 3GPP technical specification.KASUMI is a block cipher with 128-bit key and 64-bit input and output. The core of KASUMI is an eight-round Feistel network. The round functionsin the main Feistel network are irreversible Feistel-like networktransformations. In each round the round function uses a round keywhich consists of eight 16-bit sub keysderived from the original 128-bit key using a fixed key schedule. The 128-bit key K is divided into eight 16-bit sub keys Ki: K = K 1 ‖ K 2 ‖ K 3 ‖ K 4 ‖ K 5 ‖ K 6 ‖ K 7 ‖ K 8 {displaystyle K=K_{1}|K_{2}|K_{3}|K_{4}|K_{5}|K_{6}|K_{7}|K_{8},} Additionally a modified key K', similarly divided into 16-bitsub keys K'i, is used. The modified key is derived fromthe original key by XORing with 0x123456789ABCDEFFEDCBA9876543210 (chosen as a 'nothing up my sleeve' number).

[ "Block cipher" ]
Parent Topic
Child Topic
    No Parent Topic