[14075] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Code breakers crack GSM cellphone encryption

daemon@ATHENA.MIT.EDU (David Honig)
Sun Sep 7 23:11:27 2003

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Sun, 07 Sep 2003 17:18:20 -0700
To: "R. A. Hettinga" <rah@shipwright.com>,
	Clippable <rahettinga@earthlink.net>
From: David Honig <dahonig@cox.net>
Cc: cryptography@metzdowd.com
In-Reply-To: <p06002034bb81360872bc@[66.149.49.6]>

At 03:32 PM 9/7/03 -0400, R. A. Hettinga wrote:
>If the cellphone companies in 197 countries want to correct the code errors
>that expose them to trickery and abuse, they will have to call in each
>customer to make a change in the cellphone's programming, or replace all of
>the cellular phones used by their subscribers.

I've read that the lifecycle of a cell phone is about 2 years, 
FWIW.

During a kids-channel TV show, I saw that if you buy 4 dolls
you get a prepaid phone free.  Took me a while to get over
that future-shock.

>A copy of the research was sent to GSM authorities in order to correct the
>problem, and the method is being patented so that in future it can be used
>by the law enforcement agencies.

"Laughing my ass off."  Since when do governments care about patents? 
How would this help/harm them from exploiting it?   Not that
high-end LEOs haven't already had this capacity ---Biham et al
are only the first *open* researchers to reveal this.









---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post