Cryptanalysis of GSM Encryption Algorithm A5/1

被引:0
|
作者
Ghafari, Vahid Amin [1 ,2 ]
Vardasbi, Ali [3 ]
Mohajeri, Javad [3 ]
机构
[1] RCISP, Tehran, Iran
[2] Malek Ashtar Univ Technol, Dept Informat & Commun Technol, Tehran, Iran
[3] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
关键词
A5/1; Precomputed Table; Useless States; Internal State Transition; Ultimately Periodic;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 2(39.91) and2(21.1), respectively. In this paper, we propose a method for identification and elimination of useless states from the pre-computed tables and a new approach to access the table in the online phase of the attack which reduces the time complexity to 2(37.89) and the required memory in half. Furthermore, we discuss another weakness of A5/1 by investigating its internal state transition and its keystream sequence period. Consequently, the internal states are divided into two classes, initially periodic and ultimately periodic. The presented model is verified using a variety of simulations which are consistent with the theoretical results. (C) 2012 ISC. All rights reserved.
引用
收藏
页码:107 / 114
页数:8
相关论文
共 50 条
  • [21] Cryptanalysis of a DNA and chaos based image encryption algorithm
    Dou, Yuqiang
    Liu, Xiumin
    Fan, Haiju
    Li, Ming
    OPTIK, 2017, 145 : 456 - 464
  • [22] Cryptanalysis of genetic algorithm-based encryption scheme
    Wong, Kuan-Wai
    Yap, Wun-She
    Wong, Denis C-K
    Phan, Raphael C-W
    Goi, Bok-Min
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (35-36) : 25259 - 25276
  • [23] Cryptanalysis of an image encryption algorithm based on DNA encoding
    Akhavan, A.
    Samsudin, A.
    Akhshani, A.
    OPTICS AND LASER TECHNOLOGY, 2017, 95 : 94 - 99
  • [24] Cryptanalysis of genetic algorithm-based encryption scheme
    Kuan-Wai Wong
    Wun-She Yap
    Denis C.-K. Wong
    Raphael C.-W. Phan
    Bok-Min Goi
    Multimedia Tools and Applications, 2020, 79 : 25259 - 25276
  • [25] Cryptanalysis of the two-dimensional circulation encryption algorithm
    De Cannière, C
    Lano, J
    Preneel, B
    EURASIP JOURNAL ON APPLIED SIGNAL PROCESSING, 2005, 2005 (12) : 1923 - 1927
  • [26] Cryptanalysis of the Parameterized Improved Fast Encryption Algorithm for Multimedia
    Al-Zaidy, Rabeah
    Kircanski, Aleksandar
    Youssef, Amr M.
    IEEE COMMUNICATIONS LETTERS, 2008, 12 (12) : 886 - 887
  • [27] Cryptanalysis of a chaos-based image encryption algorithm
    Cokal, Cahit
    Solak, Ercan
    PHYSICS LETTERS A, 2009, 373 (15) : 1357 - 1360
  • [28] Cryptanalysis of nonlinear confusion component based encryption algorithm
    Munir, Noor
    Khan, Majid
    Shah, Tariq
    Alanazi, Ammar S.
    Hussain, Iqtadar
    INTEGRATION-THE VLSI JOURNAL, 2021, 79 : 41 - 47
  • [29] Cryptanalysis of an image encryption algorithm using Chebyshev generator
    Wang, Xingyuan
    Luan, Dapeng
    Bao, Xuemei
    DIGITAL SIGNAL PROCESSING, 2014, 25 : 244 - 247
  • [30] Cryptanalysis of a color image encryption algorithm based on chaos
    Tu, Guangyou
    Liao, Xiaofeng
    Xiang, Tao
    OPTIK, 2013, 124 (22): : 5411 - 5415