Abstract
This paper presents two methods for cryptanalysis of the CAVE algorithm, a four or eight round cryptographic algorithm currently used in mobile telephony. Our attacks demonstrate that CAVE is insecure (with any number of rounds) as a hash function for authentication or data integrity applications.