Abstract
Cellular Message Encryption Algorithm (CMEA) has been widely used for wireless security and the breaking of the scheme proves the requirement of alternatives. In the current paper the properties of the CMEA, which has lead to the successful cryptanalysis, has been identified. Accordingly the algorithm has been modified to prevent the attacks. Finally the customized CMEA has been subjected to standard linear and differential cryptanalysis to evaluate its security margin. The endeavour demonstrates that with appropriate modifications the CMEA can be transformed into a strong cipher, which is essential for wireless security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
TIA Telecommunications Industry Association, Common Cryptographic Algorithms, Revision D.1, Publication Version (September 13 2003), http://ftp.tiaonline.org/TR-45/TR45AHAG/Public/ComCryptAlgD1.pdf
Wagner, D., Schneier, B., Kelsey, J.: Cryptanalysis of the Cellular Message Encryption Algorithm. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 526–537. Springer, Heidelberg (1997)
Daemen, J., Rijmen, V.: The Design of Rijndael. Springer, Heidelberg (2002)
Rijmen, V.: Efficient Implementation of the Rijndael Sbox, http://www.esat.kuleuven.ac.be/~rijmen/rijndael
Keys, H.M.: A Tutorial on Linear and Differential Cryptanalysis, http://www.engr.mun.ca/~howard/PAPERS/ldc_tutorial.ps
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mukhopadhyay, D., Chaudhary, A., Nebhnani, A., RoyChowdhury, D. (2005). CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks. In: Jajodia, S., Mazumdar, C. (eds) Information Systems Security. ICISS 2005. Lecture Notes in Computer Science, vol 3803. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11593980_16
Download citation
DOI: https://doi.org/10.1007/11593980_16
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-30706-8
Online ISBN: 978-3-540-32422-5
eBook Packages: Computer ScienceComputer Science (R0)