A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
New Stream Cipher Designs
Security enhancements against UMTS-GSM interworking attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cryptanalysis of the DECT standard cipher
FSE'10 Proceedings of the 17th international conference on Fast software encryption
A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Speaker recognition in encrypted voice streams
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
Non-randomness in eSTREAM candidates salsa20 and TSC-4
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Conditional estimators: an effective attack on A5/1
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
On the stability of m-sequences
IMACC'11 Proceedings of the 13th IMA international conference on Cryptography and Coding
A secure approach for SMS in GSM network
Proceedings of the CUBE International Information Technology Conference
On the security of IV dependent stream ciphers
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
A review of security attacks on the GSM standard
ICT-EurAsia'13 Proceedings of the 2013 international conference on Information and Communication Technology
Slid pairs in the initialisation of the A5/1 stream cipher
AISC '13 Proceedings of the Eleventh Australasian Information Security Conference - Volume 138
An experimental security analysis of two satphone standards
ACM Transactions on Information and System Security (TISSEC)
Enhancing security in mobile data networks through end user and core network cooperation
Proceedings of International Conference on Advances in Mobile Computing & Multimedia
Hi-index | 754.84 |
A5/1 is a stream cipher used in the Global System for Mobile Communications (GSM) standard. Several time-memory tradeoff attacks against A5/1 have been proposed, most notably the attack by Biryukov, Shamir and Wagner (1978), which can break A5/1 in seconds using huge precomputation time and memory. This article presents a completely different attack on A5/1, based on ideas from correlation attacks. Whereas time-memory tradeoff attacks have a complexity which is exponential with the shift-register length, the complexity of the proposed attack is almost independent of the shift-register length. Our implementation of the suggested attack breaks A5/1 in a few minutes using 2-5 min of conversation plaintext.