[145579] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: GSM eavesdropping

daemon@ATHENA.MIT.EDU (Frank A. Stevenson)
Mon Aug 2 11:43:47 2010

From: "Frank A. Stevenson" <frank@hvitehus.no>
To: Bill Squier <groo@old-ones.com>
Cc: Cryptography <cryptography@metzdowd.com>
In-Reply-To: <9438EAC2-9830-43CF-9AF7-5501EB779A9A@old-ones.com>
Date: Mon, 02 Aug 2010 17:38:17 +0200

On Mon, 2010-08-02 at 11:02 -0400, Bill Squier wrote:
> "...In his presentation at the Black Hat Conference, German GSM expert Karsten Nohl presented a tool he calls Kraken, which he claims can crack the A5/1 encryption used for cell phone calls within seconds."
> 
> http://www.h-online.com/security/news/item/Quickly-decrypting-cell-phone-calls-1048850.html
> 

A quick list of bullet points on what is new here:

* 2TB (1.7 compressed) of GSM A5/1 rainbow tables have been created
* These tables leverage the fact that A5/1 suffers from "keyspace
convergence". After the initial 100 warm-up clockings, only 16% of the
keyspace remains valid.
* The rainbow tables only sample the converged space, such samples are
equivalent to sampling all of the on average 13 initial states that
converge to the sampled point.
* Efficient ATI GPU code has been written, that allowed us to compute
the tables in 8 "GPU months", and were effectively completed in just 4
weeks, using 4 computers and 850kWh of power.
* Depending on the random access speed of the storage medium, 64 bits
keys for a particular conversation can be cracked in minutes or seconds.
* We have made all software and the tables freely available.

Frank A. Stevenson


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post