ETSI SAGE 3GPP Standard Algorithms Task Force
Total Page:16
File Type:pdf, Size:1020Kb
3GPP TSG SA WG3 Security — S3#15 S3-000567 12-14 September, 2000 ETSI SAGE 3GPP Task Force (99) 37 Washington D.C., USA ETSI SAGE 3GPP Standard Algorithms Task Force Public Report Security Algorithms Group of Experts (SAGE) Report on the Evaluation of 3GPP Standard Confidentiality and Integrity Algorithms VERSION – 1.1 Date: 2000-04-08 3GPP Task Force CONFIDENTIAL 2 ETSI SAGE 3GPP Standard Algorithms Task Force Reference Keywords 3GPP, security, SAGE, algorithm ETSI Secretariat Postal address F-06921 Sophia Antipolis Cedex - FRANCE Office address 650 Route des Lucioles - Sophia Antipolis Valbonne - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 X.400 c= fr; a=atlas; p=etsi; s=secretariat Internet [email protected] http://www.etsi.fr Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the foregoing restriction extend to reproduction in all media. © European Telecommunications Standards Institute 1999. All rights reserved. 3GPP Task Force CONFIDENTIAL 3 ETSI SAGE 3GPP Standard Algorithms Task Force Contents Intellectual Property Rights................................................................................................................................ 4 Foreword ............................................................................................................................................................ 4 1 Scope........................................................................................................................................................ 5 2 References................................................................................................................................................ 5 3 Abbreviations........................................................................................................................................... 5 4 Structure of this report ............................................................................................................................. 7 5 Background to the design and evaluation work....................................................................................... 7 6 Summary of algorithm requirements ....................................................................................................... 7 6.1 f8 – Confidentiality algorithm............................................................................................................................. 8 6.2 f9 – Integrity algorithm....................................................................................................................................... 8 6.3 Generic requirements for 3GPP cryptographic functions and algorithms........................................................... 8 7 3GPP confidentiality and integrity algorithms......................................................................................... 9 7.1 KASUMI............................................................................................................................................................. 9 7.2 Confidentiality function f8................................................................................................................................ 10 7.3 Integrity function f9.......................................................................................................................................... 11 8 Rationale for the chosen design ............................................................................................................. 11 8.1 General comments ............................................................................................................................................ 11 8.2 Design Policy of MISTY1 ................................................................................................................................ 12 8.3 Changes from MISTY1 to KASUMI................................................................................................................ 13 8.3.1 Data Encryption Part.................................................................................................................................. 13 8.3.2 Key Scheduling Part................................................................................................................................... 13 9 Algorithm evaluation ............................................................................................................................. 13 9.1 Evaluation criteria............................................................................................................................................. 13 9.1.1 Analysis of various components of KASUMI............................................................................................ 13 9.1.2 Analysis of KASUMI as a generic 64-bits block cipher ............................................................................ 14 9.1.3 Analysis of the encryption and integrity modes......................................................................................... 14 9.2 Mathematical analysis of KASUMI.................................................................................................................. 15 9.2.1 Properties of components........................................................................................................................... 15 9.2.2 Differential cryptanalysis ........................................................................................................................... 17 9.2.3 Truncated differentials ............................................................................................................................... 19 9.2.4 Linear cryptanalysis ................................................................................................................................... 20 9.2.5 Higher order differential attacks................................................................................................................. 20 9.3 Implementation attacks..................................................................................................................................... 20 9.4 Analysis of f8 and f9......................................................................................................................................... 20 9.4.1 Supporting arguments for the f8 construction............................................................................................ 20 9.4.2 On the Construction of f9........................................................................................................................... 21 9.5 Statistical evaluation......................................................................................................................................... 21 9.5.1 Criteria for statistical evaluation ................................................................................................................ 21 9.5.2 Results from statistical test......................................................................................................................... 23 9.6 Results from independent evaluation................................................................................................................ 24 9.6.1 Evaluator 1 ................................................................................................................................................. 24 9.6.2 Evaluator 2 ................................................................................................................................................. 24 9.6.3 Evaluator 3 ................................................................................................................................................. 26 9.7 Results from complexity evaluation ................................................................................................................. 27 9.8 Conclusion of evaluation .................................................................................................................................. 27 Annex A - External references......................................................................................................................... 28 3GPP Task Force CONFIDENTIAL 4 ETSI SAGE 3GPP Standard Algorithms Task Force Intellectual Property Rights ETSI has not been informed of the existence of any Intellectual Property Right (IPR) which could be, or could become essential to the present document. However, pursuant to the ETSI Interim IPR Policy, no investigation, including IPR searches, has been carried out. No guarantee can be given as to the existence of any IPRs that are, or may be, or may become, essential to the present document. Foreword This Report has been produced by ETSI SAGE Task Force for the design of the Standard 3GPP Confidentiality and Integrity Algorithms (SAGE TF 3GPP). The work described in this report was undertaken in response to a request made by 3GPP. Version 1 of this report was submitted to the 3GPP SA3 group in December 1999. In August 2000 a version 1.1 was issued. This addressed a new result on the evaluation of the f9 mode (see section 9.4.2. of this report) and also showed the correct use of the Direction bit in the f9 mode. 3GPP Task Force CONFIDENTIAL 5 ETSI SAGE 3GPP Standard Algorithms Task Force Scope This public report contains a detailed summary