<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://70.231.62.181/index.php?action=history&amp;feed=atom&amp;title=Cellular_Message_Encryption_Algorithm</id>
	<title>Cellular Message Encryption Algorithm - Revision history</title>
	<link rel="self" type="application/atom+xml" href="http://70.231.62.181/index.php?action=history&amp;feed=atom&amp;title=Cellular_Message_Encryption_Algorithm"/>
	<link rel="alternate" type="text/html" href="http://70.231.62.181/index.php?title=Cellular_Message_Encryption_Algorithm&amp;action=history"/>
	<updated>2026-04-15T01:20:56Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.45.1</generator>
	<entry>
		<id>http://70.231.62.181/index.php?title=Cellular_Message_Encryption_Algorithm&amp;diff=1450537&amp;oldid=prev</id>
		<title>imported&gt;Iamwikipedian12 at 16:57, 27 September 2024</title>
		<link rel="alternate" type="text/html" href="http://70.231.62.181/index.php?title=Cellular_Message_Encryption_Algorithm&amp;diff=1450537&amp;oldid=prev"/>
		<updated>2024-09-27T16:57:50Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Short description|Block cipher}}&lt;br /&gt;
{{Infobox block cipher&lt;br /&gt;
| name          = CMEA&lt;br /&gt;
| image         =&lt;br /&gt;
| caption       =&lt;br /&gt;
| designers     = [[James A. Reeds III]]&lt;br /&gt;
| publish date  = 1991&lt;br /&gt;
| derived from  =&lt;br /&gt;
| derived to    =&lt;br /&gt;
| key size      = 64 bits&lt;br /&gt;
| block size    = 16–64 bits&lt;br /&gt;
| structure     =&lt;br /&gt;
| rounds        = 3&lt;br /&gt;
| cryptanalysis = 338 chosen plaintexts break all block sizes, 40-80 known plaintexts break 24-bit blocks, and 4 known plaintexts break 16-bit blocks&lt;br /&gt;
}}&lt;br /&gt;
In [[cryptography]], the &amp;#039;&amp;#039;&amp;#039;Cellular Message Encryption Algorithm&amp;#039;&amp;#039;&amp;#039; (&amp;#039;&amp;#039;&amp;#039;CMEA&amp;#039;&amp;#039;&amp;#039;) is a [[block cipher]] which was used for securing [[mobile phone]]s in the [[United States]]. CMEA is one of four [[Cryptography|cryptographic]] primitives specified in a [[Telecommunications Industry Association]] (TIA) standard, and is designed to [[encrypt]] the control channel, rather than the voice data. In 1997, a group of cryptographers published attacks on the [[cipher]] showing it had several weaknesses which give it a trivial effective strength of a 24-bit to 32-bit cipher.&amp;lt;ref name=&amp;quot;crypto97_cmea&amp;quot;&amp;gt;{{cite conference&lt;br /&gt;
    | author = [[David A. Wagner|David Wagner]], [[Bruce Schneier]], [[John Kelsey (cryptanalyst)|John Kelsey]]&lt;br /&gt;
    | title = Cryptanalysis of the Cellular Message Encryption Algorithm&lt;br /&gt;
    | conference = Advances in Cryptology – [[CRYPTO]] &amp;#039;97, 17th Annual International Cryptology Conference&lt;br /&gt;
    | pages = 526&amp;amp;ndash;537&lt;br /&gt;
    | date = August 1997&lt;br /&gt;
    | location = [[Santa Barbara, California]]&lt;br /&gt;
    | url = http://www.schneier.com/paper-cmea.html&lt;br /&gt;
    | format = [[PDF]]/[[PostScript]]&lt;br /&gt;
    | access-date = 2007-02-07 }}&lt;br /&gt;
&amp;lt;/ref&amp;gt;&lt;br /&gt;
Some accusations were made that the [[NSA]] had pressured the original designers into crippling CMEA, but the NSA has denied any role in the design or selection of the algorithm. The [[ECMEA]] and [[SCEMA]] ciphers are derived from CMEA.&lt;br /&gt;
&lt;br /&gt;
CMEA is described in {{US patent|5159634}}. It is [[byte-oriented]], with variable [[block size (cryptography)|block size]], typically 2 to 6 bytes. The [[key size]] is only 64 bits. Both of these are unusually small for a modern cipher. The algorithm consists of only 3 passes over the data: a non-linear left-to-right diffusion operation, an unkeyed linear mixing, and another non-linear diffusion that is in fact the inverse of the first. The non-linear operations use a keyed [[lookup table]] called the &amp;#039;&amp;#039;T-box&amp;#039;&amp;#039;, which uses an unkeyed lookup table called the &amp;#039;&amp;#039;CaveTable&amp;#039;&amp;#039;. The algorithm is [[Involution (mathematics)|self-inverse]]; re-encrypting the ciphertext with the same key is equivalent to decrypting it.&lt;br /&gt;
&lt;br /&gt;
CMEA is severely insecure. There is a [[chosen-plaintext attack]], effective for all block sizes, using 338 chosen plaintexts. For 3-byte blocks (typically used to encrypt each dialled digit), there is a [[known-plaintext attack]] using 40 to 80 known plaintexts. For 2-byte blocks, 4 known plaintexts suffice.&lt;br /&gt;
&lt;br /&gt;
The &amp;quot;improved&amp;quot; CMEA, CMEA-I, is not much better: chosen-plaintext attack of it requires less than 850 plaintexts in its adaptive version.&amp;lt;ref name=&amp;quot;url_eprint_2008_445&amp;quot;&amp;gt;{{cite web |url=http://eprint.iacr.org/2008/445.pdf |format=PDF|title=Cryptanalysis of the Improved Cellular Message Encryption Algorithm |author1=Thomas Chardin |author2=Raphaël Marinier }}&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==See also==&lt;br /&gt;
* [[A5/1]], the broken encryption algorithm used in the [[GSM]] cellular telephone standard&lt;br /&gt;
* [[ORYX]]&lt;br /&gt;
* [[Cellular Authentication and Voice Encryption|CAVE]]&lt;br /&gt;
&lt;br /&gt;
==References==&lt;br /&gt;
{{reflist}}&lt;br /&gt;
&lt;br /&gt;
==External links==&lt;br /&gt;
* [http://www.schneier.com/cmea.html The attack on CMEA]&lt;br /&gt;
* [https://web.archive.org/web/20040617095418/http://www.snapshield.com/www_problems/United_States/New_Digital.htm Press release and the NSA response]&lt;br /&gt;
* [http://www.cs.berkeley.edu/~daw/papers/cmea-crypto97-www/paper10.html Cryptanalysis of the Cellular Message Encryption Algorithm David Wagner Bruce Schneier 1997]&lt;br /&gt;
&lt;br /&gt;
{{Cryptography navbox | block}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Broken block ciphers]]&lt;/div&gt;</summary>
		<author><name>imported&gt;Iamwikipedian12</name></author>
	</entry>
</feed>