Route 66: Passively Breaking All GSM Channels

Philip S. Vejre, Andrey Bogdanov

Research output: Chapter in Book/Report/Conference proceedingArticle in proceedingsResearchpeer-review

Abstract

The A5/2 stream cipher used for encryption in the GSM mobile phone standard has previously been shown to have serious weaknesses. Due to a lack of key separation and flaws in the security protocols, these vulnerabilities can also compromise the stronger GSM ciphers A5/1 and A5/3. Despite GSM's huge impact in the field, only a small selection of its channels have been analyzed. In this paper, we perform a complete practical-complexity, ciphertext-only cryptanalysis of all 66 encoded GSM channels. Moreover, we present a new passive attack which recovers the encryption key by exploiting the location updating procedure of the GSM protocol. This update is performed automatically even when the phone is not actively used. Interestingly, the attack potentially enables eavesdropping of future calls.
Original languageEnglish
Title of host publicationInformation Security and Privacy : 19th Australasian Conference, ACISP 2014. Proceedings
PublisherSpringer
Publication date2014
Pages422-429
ISBN (Print)978-3-319-08343-8
ISBN (Electronic)978-3-319-08344-5
DOIs
Publication statusPublished - 2014
Event19th Australasian Conference on Information Security and Privacy - Wollongong, Australia
Duration: 7 Jul 20149 Jul 2014
Conference number: 19

Conference

Conference19th Australasian Conference on Information Security and Privacy
Number19
Country/TerritoryAustralia
CityWollongong
Period07/07/201409/07/2014
SeriesLecture Notes in Computer Science
Volume8544
ISSN0302-9743

Fingerprint

Dive into the research topics of 'Route 66: Passively Breaking All GSM Channels'. Together they form a unique fingerprint.

Cite this