Skip to main content

The Security of Mobile Phones (GSM)

  • Chapter
Book cover Stream Ciphers
  • 1635 Accesses

Abstract

Beginning with this chapter the focus switches from general principles to special ciphers. We start with the two variants of the A5 cipher of the GSM protocol (mobile phones). We will learn how to break these ciphers and by the way revisit many of the attacks from the previous chapters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Barkan, E., Biham, E.: Conditional estimators: an effective attack on A5/1. In: Selected Areas in Cryptography. Lecture Notes in Comput. Sci., vol. 3897, pp. 1–19. Springer, Berlin (2006)

    Chapter  Google Scholar 

  2. Barkan, E., Biham, E., Keller, N.: Instant ciphertext-only cryptanalysis of GSM encrypted communication. In: Advances in Cryptology—CRYPTO 2003. LNCS, vol. 2729, pp. 600–616. Springer, Berlin (2003)

    Chapter  Google Scholar 

  3. Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5/1 on a PC. In: Fast Software Encryption (2000). http://cryptome.org/a5.ps

    Google Scholar 

  4. Briceno, M., Goldberg, I., Wagner, D.: An implementation of GSM A3A8 algorithm (1998). http://www.iol.ie/~kooltex/a3a8.txt

  5. Briceno, M., Goldberg, I., Wagner, D.: GSM cloning (1998). http://www.isaac.cs.berkeley.edu/isaac/gsm-faq.html

  6. Briceno, M., Goldberg, I., Wagner, D.: A pedagogical implementation of the GSM A5/1 and A5/2 “voice privacy” encryption algorithms (1999). http://cryptome.org/gsm-a512.htm

  7. Ekdahl, P., Johansson, T.: Another attack on A5/1. IEEE Trans. Inf. Theory 49(1), 284–289 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  8. Goldberg, I., Wegner, D., Green, L.: The (real-time) cryptanalysis of A5/2. Presented at the Rump Session of Crypto ’99 (1999). Slides available at www.cs.berley.edu/~daw/tmp/a52-sliedes.ps

  9. Maximov, A., Johansson, T., Babbage, S.: An improved correlation attack on A5/1. In: Selected Areas in Cryptography. Lecture Notes in Comput. Sci., vol. 3357, pp. 1–18. Springer, Berlin (2005)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Klein, A. (2013). The Security of Mobile Phones (GSM). In: Stream Ciphers. Springer, London. https://doi.org/10.1007/978-1-4471-5079-4_8

Download citation

Publish with us

Policies and ethics