[14092] in cryptography@c2.net mail archive
Re: Code breakers crack GSM cellphone encryption
daemon@ATHENA.MIT.EDU (Anton Stiglic)
Mon Sep 8 14:40:46 2003
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
From: "Anton Stiglic" <astiglic@okiok.com>
To: "Greg Rose" <ggr@qualcomm.com>
Cc: "John Doe Number Two" <johndoe2@mail.anonymizer.com>,
<cryptography@metzdowd.com>
Date: Mon, 8 Sep 2003 14:24:23 -0400
----- Original Message -----
From: "Greg Rose" <ggr@qualcomm.com>
To: "Anton Stiglic" <astiglic@okiok.com>
Cc: "John Doe Number Two" <johndoe2@mail.anonymizer.com>;
<cryptography@metzdowd.com>
Sent: Monday, September 08, 2003 1:39 PM
Subject: Re: Code breakers crack GSM cellphone encryption
> At 11:43 AM 9/8/2003 -0400, Anton Stiglic wrote:
> >I think this is different however. The recent attack focused on the A5/3
> >encryption algorithm, while the work of Lucky, Briceno, Goldberg, Wagner,
> >Biryukov, Shamir (and others?) was on A5/1 and A5/2 (and other crypto
> >algorithms of GSM, such as COMP128, ...).
>
> No, that's not right. The attack *avoids* A5/3, by making the terminal end
> of the call fall back to A5/2, solving for the key in real time, then
> continuing to use the same key with A5/3.
That`s what I meant to say but did not use the right words to say.
The attack does however seem novel.
I haven`t seen the paper on the web yet (all I know is that it was
presented at Crypto 03 which I did not attend), I`m anxious to get my hands
on it.
--Anton
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com