Cryptanalysis of GSM Encryption Algorithm A5/1

被引:0
|
作者
Ghafari, Vahid Amin [1 ,2 ]
Vardasbi, Ali [3 ]
Mohajeri, Javad [3 ]
机构
[1] RCISP, Tehran, Iran
[2] Malek Ashtar Univ Technol, Dept Informat & Commun Technol, Tehran, Iran
[3] Sharif Univ Technol, Elect Res Inst, Tehran, Iran
关键词
A5/1; Precomputed Table; Useless States; Internal State Transition; Ultimately Periodic;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 2(39.91) and2(21.1), respectively. In this paper, we propose a method for identification and elimination of useless states from the pre-computed tables and a new approach to access the table in the online phase of the attack which reduces the time complexity to 2(37.89) and the required memory in half. Furthermore, we discuss another weakness of A5/1 by investigating its internal state transition and its keystream sequence period. Consequently, the internal states are divided into two classes, initially periodic and ultimately periodic. The presented model is verified using a variety of simulations which are consistent with the theoretical results. (C) 2012 ISC. All rights reserved.
引用
收藏
页码:107 / 114
页数:8
相关论文
共 50 条
  • [41] REVEALING ENCRYPTION ALGORITHM FOR INTEGRATING WITH QUANTUM TECHNOLOGIES BY USING CRYPTANALYSIS
    Abdinurova, Nazgul
    Kynabay, Bakdaulet
    2018 14TH INTERNATIONAL CONFERENCE ON ELECTRONICS COMPUTER AND COMPUTATION (ICECCO), 2018,
  • [42] Cryptanalysis and security improvement for a symmetric color image encryption algorithm
    Thang Manh Hoang
    Hoang Xuan Thanh
    OPTIK, 2018, 155 : 366 - 383
  • [43] Divide and capture: An improved cryptanalysis of the encryption standard algorithm RSA
    Susilo, Willy
    Tonien, Joseph
    Yang, Guomin
    COMPUTER STANDARDS & INTERFACES, 2021, 74
  • [44] Cryptanalysis of a Chaotic Image Encryption Algorithm Based on information Entropy
    Li, Chengqing
    Lin, Dongdong
    Feng, Bingbing
    Lu, Jinhu
    Hao, Feng
    IEEE ACCESS, 2018, 6 : 75834 - 75842
  • [45] Cryptanalysis of an image block encryption algorithm based on chaotic maps
    Ma, Yunling
    Li, Chengqing
    Ou, Bo
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [46] On the Application of Symbolic Regression and Genetic Programming for Cryptanalysis of Symmetric Encryption Algorithm
    Smetka, Tomas
    Homoliak, Ivan
    Hanacek, Petr
    2016 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2016, : 305 - 312
  • [47] Cryptanalysis of an Image Encryption Algorithm Based on Random Walk and Hyperchaotic Systems
    Fan, Haiju
    Lu, Heng
    Zhang, Chenjiu
    Li, Ming
    Liu, Yanfang
    ENTROPY, 2022, 24 (01)
  • [48] Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
    Wun-She Yap
    Raphael C.-W. Phan
    Wei-Chuen Yau
    Swee-Huay Heng
    Nonlinear Dynamics, 2015, 80 : 1483 - 1491
  • [49] Cryptanalysis and improvement of an image encryption algorithm based on chaotic and Latin square
    Wu, Wanqing
    Wang, Qiao
    NONLINEAR DYNAMICS, 2023, 111 (04) : 3831 - 3850
  • [50] Cryptanalysis of a new image alternate encryption algorithm based on chaotic map
    Yap, Wun-She
    Phan, Raphael C. -W.
    Yau, Wei-Chuen
    Heng, Swee-Huay
    NONLINEAR DYNAMICS, 2015, 80 (03) : 1483 - 1491