Another attack on A5/1
Författare
Summary, in English
A5/1 is a stream cipher used in the Global System for Mobile Communications (GSM) standard. Several time-memory tradeoff attacks against A5/1 have been proposed, most notably the recent attack by Biryukov, Shamir, and Wagner, which can break A5/1 in seconds using huge precomputation time and memory. This correspondence presents a completely different attack on A5/1, based on ideas from correlation attacks. Whereas time-memory tradeoff attacks have a complexity which is exponential with the shift-register length, the complexity of the proposed attack is almost independent of the shift-register length. Our implementation of the suggested attack breaks A5/1 in a few minutes using 2-5 min of conversation plaintext.
Publiceringsår
2003
Språk
Engelska
Sidor
284-289
Publikation/Tidskrift/Serie
IEEE Transactions on Information Theory
Volym
49
Issue
1
Dokumenttyp
Artikel i tidskrift
Förlag
IEEE - Institute of Electrical and Electronics Engineers Inc.
Ämne
- Electrical Engineering, Electronic Engineering, Information Engineering
Nyckelord
- GSM
- cryptanalysis
- A5/1
- correlation attacks
- stream ciphers
Status
Published
ISBN/ISSN/Övrigt
- ISSN: 0018-9448