Application of ESA in the CAVE Mode Authentication

This paper proposes the authentication method using ESA algorithm instead of using CAVE algorithm in the CDMA mobile communication systems including IS-95 and CDMA2000 1x. And, we analyze to apply ESA mechanism on behalf of CAVE mechanism without the change of message format and air interface in the existing CDMA systems. If ESA algorithm can be used as the substitution of CAVE algorithm, security strength of authentication algorithm is intensified without protocol change. An algorithm replacement proposed in this paper is not to change an authentication mechanism, but to configure input of ESA algorithm and to produce output. Therefore, our proposal can be the compatible to the existing systems.




References:
[1] 3GPP2 S.S0053, "Common Cryptographic Algorithms", 2002.
[2] 3GPP2 S.S0055, "Enhanced Cryptographic Algorithms", 2005.
[3] 3GPP2 S.S0078, "Common Security Algorithms", 2005.
[4] 3GPP2 S.S0054, "Interface Specification for Common Cryptographic
Algorithms", 2002.
[5] 3GPP2 S.R0032, "ESA and ESP", 2000.
[6] 3GPP2 N.S0014, "Authentication Enhancements", 2000.
[7] TIA-95-B, "Mobile Station-Base Station Compatibility Standard for
Wideband Spectrum Cellular System", 2004.
[8] FIPS 180-2, "Secure Hash Standard", NIST, 2002.
[9] 3GPP TS 33.102, "Security Architecture", 2004
[10] Vijay K. Grag, "IS-95 CDMA and CDMA2000", Prentice Hall, 2000
[11] A. J. Menezes, P. C. Van Oorschot, and S. A. Vanstone, "Chapter 9: Hash
Functions and Data Integrity", HandBook of Applied Cryptography, CRC
Press, pp. 321-383, 1997.
[12] W. Millan and P. Gauravaram, "cryptanalysis of the cellular
authentication and voice encryption algorithm," IEICE Electronics
Express, Vol. 1, No. 15, pp.453-459, 2004..
[13] P. Gauravaram and W. Millan, "Improved Attack on the Cellular
Authentication and Voice Encryption Algorithm," Proc. International
workshop on Cryptographic Algorithms and their Uses, pp. 1-13, 2004.