Cryptanalysis of the Cellular Authentication and Voice Encryption Algorithm

2004 
This paper presents two methods for cryptanalysis of the CAVE algorithm, a four or eight round cryptographic algorithm currently used in mobile telephony. Our attacks demonstrate that CAVE is insecure (with any number of rounds) as a hash function for authentication or data integrity applications.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    2
    References
    3
    Citations
    NaN
    KQI
    []