International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR News item: 24 January 2013

Ming-Feng Lee, Nigel P. Smart, Bogdan Warinschi, Gaven Watson
ePrint Report ePrint Report
The UMTS/LTE protocol for mobile phone networks has been designed to offer a limited form of anonymity for mobile phone uses. In this paper we quantify precisely what this limited form of anonymity actually provides via a formal security model. The model considers an execution where the home and roaming network providers are considered as one entity. We consider two forms of anonymity, one where the mobile stations under attacked are statically selected before the execution, and a second one where the adversary selects these stations adaptively. We prove that the UMTS/LTE protocol meets both of these security definitions. Our analysis requires new assumptions on the underlying keyed functions for UMTS, which whilst probably true have not previously been brought to the fore.

Expand

Additional news items may be found on the IACR news page.