Paper 2012/425

The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures

Gautham Sekar

Abstract

The core of the 3rd Generation Partnership Project (3GPP) encryption standard 128-EEA3 is a stream cipher called ZUC. It was designed by the Chinese Academy of Sciences and proposed for inclusion in the cellular wireless standards called “Long Term Evolution” or “4G”. The LFSR-based cipher uses a 128-bit key. In this paper, we first show timing attacks on ZUC that can recover, with about 71.43% success rate, (i) one bit of the secret key immediately, and (ii) information involving 6 other key bits. The time, memory and data requirements of the attacks are negligible. While we see potential improvements to the attacks, we also suggest countermeasures.

Note: The timing analysis presented in this paper was privately communicated by the author to the ETSI/SAGE before the 2nd International Workshop on ZUC Algorithm and Related Topics. Subsequently, the reference C implementation of ZUC was modified to the one in Version 1.6 of the ZUC Specification of the ETSI/SAGE. This revised code is the latest and the ZUC specification with this code has been included in the LTE standards. The latest code is essentially the code in Version 1.5 of the ZUC Specification of the ETSI/SAGE with two corrections, one of which was proposed independently by the author to the ETSI/SAGE. See http://www.gsma.com/technicalprojects/fraud-security/security-algorithms/, under "3GPP Confidentiality and Integrity Algorithms 128-EEA3 & 128-EIA3". Further details and references are available in Sect. 6 of this ePrint paper (see "Update"). (The links to references [9], [10] and [11] have changed since the last revision and the new links are provided through this revision.)

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Minor revision. Expanded and updated version of Inscrypt 2011 paper.
Keywords
Stream ciphercache timing attackkey recovery
Contact author(s)
sgautham @ isichennai res in
History
2015-10-01: last of 8 revisions
2012-08-05: received
See all versions
Short URL
https://ia.cr/2012/425
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/425,
      author = {Gautham Sekar},
      title = {The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures},
      howpublished = {Cryptology ePrint Archive, Paper 2012/425},
      year = {2012},
      note = {\url{https://eprint.iacr.org/2012/425}},
      url = {https://eprint.iacr.org/2012/425}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.