Cryptanalysis of GSM Encryption Algorithm A5/1

被引:0
|
作者
Ghafari, Vahid Amin [1 ,2 ]
Vardasbi, Ali [3 ]
Mohajeri, Javad [3 ]
机构
[1] RCISP, Tehran, Iran
[2] Malek Ashtar Univ Technol, Dept Informat & Commun Technol, Tehran, Iran
[3] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
来源
ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY | 2012年 / 4卷 / 02期
关键词
A5/1; Precomputed Table; Useless States; Internal State Transition; Ultimately Periodic;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 2(39.91) and2(21.1), respectively. In this paper, we propose a method for identification and elimination of useless states from the pre-computed tables and a new approach to access the table in the online phase of the attack which reduces the time complexity to 2(37.89) and the required memory in half. Furthermore, we discuss another weakness of A5/1 by investigating its internal state transition and its keystream sequence period. Consequently, the internal states are divided into two classes, initially periodic and ultimately periodic. The presented model is verified using a variety of simulations which are consistent with the theoretical results. (C) 2012 ISC. All rights reserved.
引用
收藏
页码:107 / 114
页数:8
相关论文
共 50 条
  • [31] Cryptanalysis of the Two-Dimensional Circulation Encryption Algorithm
    Christophe De Cannière
    Joseph Lano
    Bart Preneel
    EURASIP Journal on Advances in Signal Processing, 2005
  • [32] Design and implementation of Rijndael algorithm for GSM encryption
    Soyjaudah, KMS
    Hosany, MA
    Jamaloodeen, A
    SYMPOTIC '04: JOINT IST WORKSHOP ON MOBILE FUTURE & SYMPOSIUM ON TRENDS IN COMMUNICATIONS, PROCEEDINGS, 2004, : 106 - 109
  • [33] Improvement of A5/1 algorithm against correlation attack
    Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    Beijing Youdian Daxue Xuebao, 2006, 4 (119-122):
  • [34] Cryptanalysis of an Image Encryption Algorithm Using DNA Coding and Chaos
    Zhao, Yuzhuo
    Shi, Qiqin
    Ding, Qun
    ENTROPY, 2025, 27 (01)
  • [35] Cryptanalysis of the integrated chaotic systems based image encryption algorithm
    Feng, Wei
    He, Yi-Gang
    Li, Hong-Min
    Li, Chun-Lai
    OPTIK, 2019, 186 : 449 - 457
  • [36] Cryptanalysis on an image block encryption algorithm based on spatiotemporal chaos
    Wang Xing-Yuan
    He Guo-Xiang
    CHINESE PHYSICS B, 2012, 21 (06)
  • [37] Cryptanalysis of fast encryption algorithm for multimedia FEA-M
    Mihaljevic, MJ
    Kohno, R
    IEEE COMMUNICATIONS LETTERS, 2002, 6 (09) : 382 - 384
  • [38] On the Cryptanalysis of a Bit-Level Image Chaotic Encryption Algorithm
    Hu, Yingchun
    Yu, Simin
    Zhang, Zeqing
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2020, 2020
  • [39] Cryptanalysis on an image block encryption algorithm based on spatiotemporal chaos
    王兴元
    何国祥
    Chinese Physics B, 2012, (06) : 81 - 87
  • [40] Cryptanalysis of a chaos-based encryption algorithm for distributed systems
    Caragata, Daniel
    Tabia, Karim
    Luduena, Mauricio
    2013 8TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2013, : 31 - +