This lecture covers the security aspects of mobile telephony, focusing on the challenges faced in 2G and the improvements introduced in 3G. Topics include GSM encryption algorithms, the MILENAGE protocol, security misses, and other standards like DECT and EDGE. The lecture also discusses collision search algorithms and integrity/authentication issues in cryptographic functions.
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Quis ex elit excepteur laborum dolore adipisicing ut minim. Quis excepteur duis commodo dolor laborum pariatur pariatur laborum nisi nostrud officia ullamco dolor. Commodo eu reprehenderit quis sunt mollit eiusmod anim commodo laboris ut commodo.
Cillum aliqua pariatur ea elit id velit eiusmod in non magna. Sint occaecat mollit laborum laboris laborum occaecat consequat in dolor magna adipisicing ullamco. Officia nulla voluptate exercitation dolor aliqua culpa mollit nulla commodo occaecat ad laboris dolor. Proident voluptate esse magna proident sint sit nostrud quis culpa laborum pariatur. Et est deserunt et tempor mollit elit nulla. Veniam mollit nostrud qui do sit consequat est incididunt officia elit aliquip incididunt quis adipisicing.
Explores message authentication codes and their formalism, with a focus on mobile telephony, covering topics like misuse attacks, security notions, and GSM architecture.
Explores the commitment scheme, key derivation function, and pseudorandom generator in cryptographic protocols, emphasizing their role in ensuring data integrity and authentication.