期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
Side-Channel Analysis for the Authentication Protocols of CDMA Cellular Networks 被引量:2
1
作者 Chi Zhang Jun-Rong Liu +4 位作者 Da-Wu Gu Wei-Jia Wang Xiang-Jun Lu Zheng Guo Hai-Ning Lu 《Journal of Computer Science & Technology》 SCIE EI CSCD 2019年第5期1079-1095,共17页
Time-division multiple access (TDMA) and code-division multiple access (CDMA) are two technologies used in digital cellular networks. The authentication protocols of TDMA networks have been proven to be vulnerable to ... Time-division multiple access (TDMA) and code-division multiple access (CDMA) are two technologies used in digital cellular networks. The authentication protocols of TDMA networks have been proven to be vulnerable to side-channel analysis (SCA), giving rise to a series of powerful SCA-based attacks against unprotected subscriber identity module (SIM) cards. CDMA networks have two authentication protocols, cellular authentication and voice encryption (CAVE) based authentication protocol and authentication and key agreement (AKA) based authentication protocol, which are used in different phases of the networks. However, there has been no SCA attack for these two protocols so far. In this paper, in order to figure out if the authentication protocols of CDMA networks are sufficiently secure against SCA, we investigate the two existing protocols and their cryptographic algorithms. We find the side-channel weaknesses of the two protocols when they are implemented on embedded systems. Based on these weaknesses, we propose specific attack strategies to recover their authentication keys for the two protocols, respectively. We verify our strategies on an 8-bit microcontroller and a real-world SIM card, showing that the authentication keys can be fully recovered within a few minutes with a limited number of power measurements. The successful experiments demonstrate the correctness and the effectiveness of our proposed strategies and prove that the unprotected implementations of the authentication protocols of CDMA networks cannot resist SCA. 展开更多
关键词 AUTHENTICATION protocol cellular AUTHENTICATION and voice encryption (CAVE) code-division multiple access (cdma) secure hash algorithm 1 (SHA-1) side-channel analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部