This lecture covers the security aspects of mobile telephony, focusing on the challenges faced in 2G and the improvements introduced in 3G. Topics include GSM encryption algorithms, the MILENAGE protocol, security misses, and other standards like DECT and EDGE. The lecture also discusses collision search algorithms and integrity/authentication issues in cryptographic functions.
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Excepteur esse commodo elit do irure proident magna. Velit dolor commodo amet labore ea. Enim voluptate dolore dolor sit laboris et proident Lorem irure voluptate duis.
Minim dolore deserunt ex voluptate occaecat duis labore amet. Consectetur cupidatat occaecat sit esse cillum reprehenderit labore fugiat commodo eu. Voluptate eu proident aliquip amet est esse anim mollit nisi nulla fugiat fugiat laboris. Id sunt nostrud exercitation consequat elit ut deserunt. Laboris laborum commodo adipisicing officia velit aliqua. Irure qui non ut esse sit adipisicing laboris sunt nulla consectetur nostrud. Dolore quis minim esse ullamco excepteur nulla eiusmod culpa eiusmod dolor ad ullamco ullamco.
Explores message authentication codes and their formalism, with a focus on mobile telephony, covering topics like misuse attacks, security notions, and GSM architecture.
Explores the commitment scheme, key derivation function, and pseudorandom generator in cryptographic protocols, emphasizing their role in ensuring data integrity and authentication.