A real-world attack breaking A5/1 within hours

28Citations
Citations of this article
69Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper we present a real-world hardware-assisted attack on the well-known A5/1 stream cipher which is (still) used to secure GSM communication in most countries all over the world. During the last ten years A5/1 has been intensively analyzed [1,2,3,4,5,6,7]. However, most of the proposed attacks are just of theoretical interest since they lack from practicability - due to strong preconditions, high computational demands and/or huge storage requirements - or have never been fully implemented. In contrast to these attacks, our attack which is based on the work by Keller and Seitz [8] is running on an existing special-purpose hardware device, called COPACOBANA [9]. With the knowledge of only 64 bits of keystream the machine is able to reveal the corresponding internal 64-bit state of the cipher in about 6 hours on average. We provide a detailed description of our attack architecture as well as implementation results. © 2008 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Gendrullis, T., Novotný, M., & Rupp, A. (2008). A real-world attack breaking A5/1 within hours. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5154 LNCS, pp. 266–282). Springer Verlag. https://doi.org/10.1007/978-3-540-85053-3_17

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free