Insecurity of GSM Communication
نویسنده
چکیده
In this paper we give a short overview of the security of the Global System of Mobile Communications (GSM) system in light of a recent attack by Barkan et al. on one of the cryptographic algorithms used for both privacy protection and authentication. The attack breaks the algorithm in a very practical way and, as we will see, a design flaw in the GSM authentication protocol allow an attacker to utilize this attack to compromise networks not using this flawed algorithm. Concretely, we will end up with a way for the attacker to use in-reach phones as oracles for doing authentication on behalf of the attacker, i.e. future attacks on GSM, in particular on the authentication protocol, can consider this attack as a procedure for doing authentication and wire-tapping without knowing the secret key. There are other attacks on the GSM system but the focus in this paper is almost exclusively on the above mentioned attack by Barkan et al. as it appears to be the most efficient. We will give a short overview of the attack and intensionally leave out a lot of the details; the original papers [3, 2] can be consulted if more in-depth discussion is needed (we suggest to read both as they both contain material not found in the other). However, as we intend for this paper to be self-contained, we include clarifying and/or more general discussion when appropiate. The outline of the paper is as follows. Section 2 gives an overview of the GSM system, in particular its security model. A discussion of the cryptographic components of the GSM system, including attacks on them, is given in section 2.2. A more thorough discussion of the primary algorithm of the attack, A5/2, is given in section 3 together with an introduction to stream ciphers. In section 4 we show how to do an efficient ciphertext-only attack on A5/2 and in section 5 we show how this attack can be used to attack other algorithms, ending up with the before-mentioned oracle for doing authentication and decryption. Finally, in section 6 we conclude with a discussion of what made these attacks possible and how it might have been avoided.
منابع مشابه
Intelligent Vehicle Control Using Wireless Embedded System in Transportation System Based On GSM and GPS Technology
Currently almost of the public having an own vehicle, theft is happening on parking and sometimes driving insecurity places. The safe of vehicles is extremely essential for public vehicles. Vehicle security and accident prevention is more challenging. So in order to bring a solution for this problem this system can be implemented. Vehicle security enhancement and accident prevention system can ...
متن کاملProviding End-to-end Secure Communicationsin Gsm Networks
The broadcast nature of radio medium in GSM networks makes them more vulnerable to various attacks. Any attacker can have complete control over the communication channel, listen to phone calls, read email, and spy on whatever data has been sent via GSM mobile communication system. This paper introduces a middleware security system that aims to protect the GSM communication channel and minimize ...
متن کاملSecure Communication System over a GSM Network
As standard GSM protection methods are now well-known to be insecure, we have designed a new secure communication system over GSM network which is developed using the Symbian OS platform. It uses standard cryptographic methods such as key generators, key exchange protocols and public and private key cipher algorithms. This system allows communicating text, voice and any kind of data securely ov...
متن کاملCryptanalysis of GSM encryption algorithm A5/1
The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 239.91and 221.1, ...
متن کاملSpeech coding gsm pdf
speech coding in gsm pdf 260 bits.found that the use of GSM coding degrades significantly the identification and. Proposes an in-depth look at the influence of GSM speech coding on text. The full-rate GSM speech codec 2 is a lossy speech coding-decoding.In cellular communication technology, quality of voice output at destination depends on the channel condition. Bad channel condition will produ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006