This lecture covers the security aspects of mobile telephony, focusing on the challenges faced in 2G and the improvements introduced in 3G. Topics include GSM encryption algorithms, the MILENAGE protocol, security misses, and other standards like DECT and EDGE. The lecture also discusses collision search algorithms and integrity/authentication issues in cryptographic functions.
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Quis excepteur eu proident nostrud dolor dolore ex deserunt eu quis deserunt est ipsum fugiat. Commodo labore sit adipisicing irure. Do voluptate et sunt adipisicing do ex officia velit cupidatat fugiat esse excepteur. Incididunt elit est adipisicing ullamco tempor amet. Esse consequat laborum aliquip sunt est consequat dolor elit eu aliquip laborum minim minim sunt. Minim irure ipsum minim exercitation ex laboris commodo amet. Incididunt duis occaecat in ad aliqua est excepteur consectetur sint.
Proident quis dolor tempor sit. Dolor eu amet aliquip anim. Officia incididunt aliquip officia dolore esse nisi sint reprehenderit tempor tempor ullamco sunt. Proident sunt deserunt ut commodo eu cupidatat esse est. Exercitation laboris magna reprehenderit cupidatat exercitation dolor nulla minim nostrud. Culpa adipisicing nulla est minim minim duis aliqua culpa est est tempor sint duis.
Explores message authentication codes and their formalism, with a focus on mobile telephony, covering topics like misuse attacks, security notions, and GSM architecture.
Explores the commitment scheme, key derivation function, and pseudorandom generator in cryptographic protocols, emphasizing their role in ensuring data integrity and authentication.