A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules. / Mayes, Keith; Babbage, Steve.

2018. 46-51 Paper presented at The Thirteenth International Conference on Systems, Athens, Greece.

Research output: Contribution to conferencePaperpeer-review

Published

Standard

A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules. / Mayes, Keith; Babbage, Steve.

2018. 46-51 Paper presented at The Thirteenth International Conference on Systems, Athens, Greece.

Research output: Contribution to conferencePaperpeer-review

Harvard

Mayes, K & Babbage, S 2018, 'A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules', Paper presented at The Thirteenth International Conference on Systems, Athens, Greece, 22/04/18 - 26/04/18 pp. 46-51.

APA

Mayes, K., & Babbage, S. (2018). A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules. 46-51. Paper presented at The Thirteenth International Conference on Systems, Athens, Greece.

Vancouver

Mayes K, Babbage S. A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules. 2018. Paper presented at The Thirteenth International Conference on Systems, Athens, Greece.

Author

Mayes, Keith ; Babbage, Steve. / A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules. Paper presented at The Thirteenth International Conference on Systems, Athens, Greece.6 p.

BibTeX

@conference{e15761bb6ebd44a8a225dc3da9b6969f,
title = "A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules",
abstract = "3G/4G mobile standards benefit from an authentication algorithm called MILENAGE that supports mutual authentication, protection against replay attack and generates session keys to protect confidentiality and integrity. Its usefulness attracts interest beyond the original usage, such as in securing diverse wireless and wired bearers used in Machine-to-Machine and Internet of Things (IoT) systems. The long-term reliance on one algorithm is a risk, and recently an alternative algorithm, called TUAK, was standardised as a safe-guard, should the Advanced Encryption Standard (AES) core of MILENAGE ever be found vulnerable. Previous performance evaluation of TUAK on Subscriber Identity Modules (SIM), found that it needed to be implemented in low level native code to satisfy system timing requirements; indeed this is usually the case for MILENAGE. However, deployed security modules, anticipated for the Internet of Things (IoT), generally provide access at an application layer, abstracted from the underlying hardware. Application layer implementation of TUAK was shown to be too slow to comply with standardised requirements and so an alternative faster algorithm was sought that could be downloaded and run in a compliant manner from the application level. The National Institute of Standards and Technology (NIST) has standardised a lightweight block-cipher called SPECK, and this paper describes work to create a SPECK alternative to MILENAGE and compares its performance with earlier results from TUAK.",
keywords = "3GPP, GSM, Keccak, SPECK, TUAK",
author = "Keith Mayes and Steve Babbage",
year = "2018",
month = apr,
day = "22",
language = "English",
pages = "46--51",
note = "The Thirteenth International Conference on Systems, ICONS 2018 ; Conference date: 22-04-2018 Through 26-04-2018",
url = "https://www.iaria.org/conferences2018/ICONS18.html",

}

RIS

TY - CONF

T1 - A SPECK Based 3G Authentication Algorithm for Download onto IoT Security Modules

AU - Mayes, Keith

AU - Babbage, Steve

PY - 2018/4/22

Y1 - 2018/4/22

N2 - 3G/4G mobile standards benefit from an authentication algorithm called MILENAGE that supports mutual authentication, protection against replay attack and generates session keys to protect confidentiality and integrity. Its usefulness attracts interest beyond the original usage, such as in securing diverse wireless and wired bearers used in Machine-to-Machine and Internet of Things (IoT) systems. The long-term reliance on one algorithm is a risk, and recently an alternative algorithm, called TUAK, was standardised as a safe-guard, should the Advanced Encryption Standard (AES) core of MILENAGE ever be found vulnerable. Previous performance evaluation of TUAK on Subscriber Identity Modules (SIM), found that it needed to be implemented in low level native code to satisfy system timing requirements; indeed this is usually the case for MILENAGE. However, deployed security modules, anticipated for the Internet of Things (IoT), generally provide access at an application layer, abstracted from the underlying hardware. Application layer implementation of TUAK was shown to be too slow to comply with standardised requirements and so an alternative faster algorithm was sought that could be downloaded and run in a compliant manner from the application level. The National Institute of Standards and Technology (NIST) has standardised a lightweight block-cipher called SPECK, and this paper describes work to create a SPECK alternative to MILENAGE and compares its performance with earlier results from TUAK.

AB - 3G/4G mobile standards benefit from an authentication algorithm called MILENAGE that supports mutual authentication, protection against replay attack and generates session keys to protect confidentiality and integrity. Its usefulness attracts interest beyond the original usage, such as in securing diverse wireless and wired bearers used in Machine-to-Machine and Internet of Things (IoT) systems. The long-term reliance on one algorithm is a risk, and recently an alternative algorithm, called TUAK, was standardised as a safe-guard, should the Advanced Encryption Standard (AES) core of MILENAGE ever be found vulnerable. Previous performance evaluation of TUAK on Subscriber Identity Modules (SIM), found that it needed to be implemented in low level native code to satisfy system timing requirements; indeed this is usually the case for MILENAGE. However, deployed security modules, anticipated for the Internet of Things (IoT), generally provide access at an application layer, abstracted from the underlying hardware. Application layer implementation of TUAK was shown to be too slow to comply with standardised requirements and so an alternative faster algorithm was sought that could be downloaded and run in a compliant manner from the application level. The National Institute of Standards and Technology (NIST) has standardised a lightweight block-cipher called SPECK, and this paper describes work to create a SPECK alternative to MILENAGE and compares its performance with earlier results from TUAK.

KW - 3GPP

KW - GSM

KW - Keccak

KW - SPECK

KW - TUAK

UR - https://www.thinkmind.org/index.php?view=article&articleid=icons_2018_3_40_40012

M3 - Paper

SP - 46

EP - 51

T2 - The Thirteenth International Conference on Systems

Y2 - 22 April 2018 through 26 April 2018

ER -