IEICE Electronics Express
Online ISSN : 1349-2543
ISSN-L : 1349-2543
LETTER
Cryptanalysis of the cellular authentication and voice encryption algorithm
William MillanPraveen Gauravaram
Author information
JOURNAL FREE ACCESS

2004 Volume 1 Issue 15 Pages 453-459

Details
Abstract

This paper presents two methods for cryptanalysis of the CAVE algorithm, a four or eight round cryptographic algorithm currently used in mobile telephony. Our attacks demonstrate that CAVE is insecure (with any number of rounds) as a hash function for authentication or data integrity applications.

Content from these authors
© 2004 by The Institute of Electronics, Information and Communication Engineers
Previous article Next article
feedback
Top