Cryptanalysis of GSM Encryption Algorithm A5/1

被引:0
|
作者
Ghafari, Vahid Amin [1 ,2 ]
Vardasbi, Ali [3 ]
Mohajeri, Javad [3 ]
机构
[1] RCISP, Tehran, Iran
[2] Malek Ashtar Univ Technol, Dept Informat & Commun Technol, Tehran, Iran
[3] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
关键词
A5/1; Precomputed Table; Useless States; Internal State Transition; Ultimately Periodic;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 2(39.91) and2(21.1), respectively. In this paper, we propose a method for identification and elimination of useless states from the pre-computed tables and a new approach to access the table in the online phase of the attack which reduces the time complexity to 2(37.89) and the required memory in half. Furthermore, we discuss another weakness of A5/1 by investigating its internal state transition and its keystream sequence period. Consequently, the internal states are divided into two classes, initially periodic and ultimately periodic. The presented model is verified using a variety of simulations which are consistent with the theoretical results. (C) 2012 ISC. All rights reserved.
引用
收藏
页码:107 / 114
页数:8
相关论文
共 50 条
  • [1] State Transition Analysis of GSM Encryption Algorithm A5/1
    Gundaram, Praveen Kumar
    Tentu, Appala Naidu
    Allu, Swamy Naidu
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2022, 18 (01) : 36 - 41
  • [2] Improvement A5/1 Encryption Algorithm Based On Sponge Techniques
    Wahab, Hala B. Abdul
    Mohammed, Mohanad A.
    2015 World Congress on Information Technology and Computer Applications (WCITCA), 2015,
  • [3] Synchronization fault cryptanalysis for breaking A5/1
    Gomulkiewicz, M
    Kutylowski, M
    Vierhaus, HT
    Wlaz, P
    EXPERIMENTAL AND EFFICIENT ALGORITHMS, PROCEEDINGS, 2005, 3503 : 415 - 427
  • [4] FPGA implementation of an optimized A5/3 encryption algorithm
    Madani, Mahdi
    Tanougast, Camel
    MICROPROCESSORS AND MICROSYSTEMS, 2020, 78 (78)
  • [5] Determining the A5 Encryption Algorithms Used in 2G (GSM) Networks
    Morgan, Danielle
    SECURE IT SYSTEMS, NORDSEC 2024, 2025, 15396 : 45 - 61
  • [6] On differential and linear cryptanalysis of the RC5 encryption algorithm
    Kaliski, BS
    Yin, YL
    ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 171 - 184
  • [7] A New Guess-and-Determine Method for Cryptanalysis of the GSM Encryption
    Jain, Ashish
    Kaur, Inderjeet
    Sharma, Akhilesh Kumar
    Gupta, Nirmal Kumar
    Chakraborty, Partha
    COMPLEXITY, 2023, 2023
  • [8] Cryptanalysis of the cellular message encryption algorithm
    Wagner, D
    Schneier, B
    Kelsey, J
    ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 526 - 537
  • [9] Integral Cryptanalysis of ACE Encryption Algorithm
    Ye Tao
    Wei Yongzhuang
    Li Lingchen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (04) : 908 - 914
  • [10] χ2 cryptanalysis of the SEAL encryption algorithm
    Handschuh, H
    Gilbert, P
    FAST SOFTWARE ENCRYPTION, 1997, 1267 : 1 - 12