GSM encryption code deciphered, published

N&P: Discuss governments, nations, politics and recent related news here.

Moderators: Alyrium Denryle, Edi, K. A. Pital

Post Reply
User avatar
Uraniun235
Emperor's Hand
Posts: 13772
Joined: 2002-09-12 12:47am
Location: OREGON
Contact:

GSM encryption code deciphered, published

Post by Uraniun235 »

Financial Times

Secret mobile phone code cracked

By Maija Palmer, technology correspondent
Published: December 29 2009 15:11 | Last updated: December 29 2009 16:17

Computer hackers this week said they had cracked and published the secret code that protects 80 per cent of the world’s mobile phones. The move will leave more than 3bn people vulnerable to having their calls intercepted, and could force mobile phone operators into a costly upgrade of their networks.

Karsten Nohl, a German encryption expert, said he had organized the hack to demonstrate the weaknesses of the security measures protecting the global system for mobile communication (GSM) and to push mobile operators to improve their systems.

“This shows that existing GSM security is inadequate,” Mr Nohl told an audience of about 600 people at the Chaos Communication Congress in Berlin, a four-day conference of computer hackers.

“We have given up hope that network operators will move to improve security on their own, but we are hoping that with this added attention, there will be increased demand from customers for them to do this,” he told the Financial Times.

This vulnerability should have been fixed 15 years ago. People should now try it out at home and see how vulnerable their calls are.”

Mr Nohl was due to run a practical demonstration of the code book at the conference on Wednesday, but has postponed it while he takes advice from lawyers on whether the exercise would be legal. However, the code is already being widely circulated on the internet.

Mr Nohl, a widely consulted cryptography expert with a doctorate in computer engineering from the University of Virginia, waged a similar campaign this year which caused the DECT Forum, a standards group based in Bern, to upgrade the security algorithm for 800m cordless home phones.

The hacked GSM code could compromise more than 3bn people in 212 countries. It does not affect 3G phone calls, however, which are protected by a different security code.

The GSM Association, the industry body for mobile phone operators, which devised the A5/1 encryption algorithm 21 years ago, said they were monitoring the situation closely.

“We are concerned but we don’t believe it will result in widespread eavesdropping tomorrow, or next week or next month,” said James Moran, security director of the GSMA.

“The reality is that a practical attack is beyond the capabilities of the vast majority of people,” he said.

However, security experts disagreed, saying that cracking the code significantly lowered the bar for intercepting calls.

“A year ago it would have required equipment costing hundreds of thousands of dollars, and serious expertise to listen in to a call,” said Simon Bransfield-Garth, chief executive of Cellcrypt, a mobile phone encryption company.

“Today it is going to require $1,500 of network equipment and a computer. It is getting down to a mainstream price tag and moving to the point when it will be straightforward to do,” he continued.

“A skilled computer engineer can now build this,” said Mr Nohl.

Mr Moran said that if the hack was thought to pose a serious practical threat, the GSM Association could force all GSM operators to upgrade their security systems to use a stronger form of encryption.

The GSMA has done this once before, in 2004, when security flaws were discovered in another security code, known as A5/2, and operators across Latin America, Asia and Africa were forced to upgrade their networks.

A security upgrade could prove very costly, however, as some operators would have to replace their old base stations completely, Mr Moran said. The A5/2 upgrade, for example, took about 18 months.

A decision on whether to upgrade to a stronger code could be taken at the next meeting of the GSMA security group in February.


And from the NYT article, the GSM Association's response:
The G.S.M. Association, the industry group based in London that devised the algorithm and represents wireless companies, called Mr. Nohl’s efforts illegal and said they overstated the security threat to wireless calls.

“This is theoretically possible but practically unlikely,” said Claire Cranton, an association spokeswoman. She said no one else had broken the code since its adoption. “What he is doing would be illegal in Britain and the United States. To do this while supposedly being concerned about privacy is beyond me.”

...

In a statement, the G.S.M. Association said efforts to crack the algorithm were more complex than critics have asserted, and that operators, by simply modifying the existing algorithm, could thwart any unintended surveillance.


It doesn't appear to be trivial to listen in to other people's cell phone calls:
(from the NYT article)
The encryption key itself does not enable surveillance of mobile calls, which must still be overheard and identified from the digital stream of thousands of calls transmitted through a single cellphone station.

The undertaking is complex because a digital call typically hops among up to 60 different broadcast frequencies during a single conversation, as the mobile network operator maximizes the use of its available bandwidth.

...but it could still pose a problem for network operators. Even if they could just "modify the algorithm" at the cell towers, surely the phones would have to be replaced or serviced as well?
"There is no "taboo" on using nuclear weapons." -Julhelm
Image
What is Project Zohar?
"On a serious note (well not really) I did sometimes jump in and rate nBSG episodes a '5' before the episode even aired or I saw it." - RogueIce explaining that episode ratings on SDN tv show threads are bunk
User avatar
Bounty
Emperor's Hand
Posts: 10767
Joined: 2005-01-20 08:33am
Location: Belgium

Re: GSM encryption code deciphered, published

Post by Bounty »

It's a nice publicity stunt for Mr Nohl, I suppose. Too bad he hasn't actually proven anything and done even less of a service to society. The current system too fifteen years to crack and even then you need expensive equipment, in-depth expertise and an ability to pick out the exact signal you need to tap into, which is beyond the means of pretty much anyone who wouldn't have other means of surveillance... and this is supposed to be a problem?

This is akin to someone repeatedly hitting his watch with a hammer and then complaining it's broken. Well, yes, if you throw inordinate amounts of effort into a futile undertaking you may at some point succeed... but if you're the only nut who wastes his time on that nonsense you're not exactly proving a point RE: the real world.

EDIT: the money quote:
“We are not recommending people use this information to break the law,” Mr. Nohl said. “What we are doing is trying to goad the world’s wireless operators to use better security.”
"We are not suggesting people rob banks; we just copied the key to the safe, which nobody can get into anyway, and which nobody but us is trying to get into, so that nobody would be able to get into it. This makes sense in my world. Also, unicorns."
User avatar
Edi
Dragonlord
Dragonlord
Posts: 12461
Joined: 2002-07-11 12:27am
Location: Helsinki, Finland

Re: GSM encryption code deciphered, published

Post by Edi »

That particular article leaves out any mention of A5/3, which is orders of magnitude more difficult to hack. It's ready for implementation, but only one operator uses that as of now.
The Register wrote: Secret code protecting cellphone calls set loose
Universal phone snooping moves forward
By Dan Goodin in San Francisco
Posted in Security, 28th December 2009 18:57 GMT

Cryptographers have moved closer to their goal of eavesdropping on cellphone conversations after cracking the secret code used to prevent the interception of radio signals as they travel between handsets and mobile operators' base stations.

The code is designed to prevent the interception of phone calls by forcing mobile phones and base stations to rapidly change radio frequencies over a spectrum of 80 channels. Without knowing the precise sequence, would-be eavesdroppers can assemble only tiny fragments of a conversation.

At a hacker conference in Berlin that runs through Wednesday, the cryptographers said they've cracked the algorithm that determines the random channel hopping and have devised a practical means to capture entire calls using equipment that costs about $4,000. At the heart of the crack is open-source software for computer-controlled radios that makes the frequency changes at precisely the same time, and in the same order, that the cellphone and base station do.

"We now know this is possible," said Karsten Nohl, a 28-year-old cryptographer and one of the members of an open-source project out to prove that GSM, the technical standard used by about 80 percent of the mobile market, can't be counted on to keep calls private. The attack "is practical, and there are real vulnerabilities that people are exploiting."

A spokeswoman for the GSM Association, which represents 800 operators in 219 countries, said officials hadn't yet seen the research.

"GSM networks use encryption technology to make it difficult for criminals to intercept and eavesdrop on calls," she wrote in an email. "Reports of an imminent GSM eavesdropping capability are common."

The channel-hopping crack comes as the collective is completing the compilation of a rainbow table that allows them to decrypt calls as they happen. The table works because GSM encryption uses A5/1, a decades-old algorithm with known weaknesses. The table - a 2-terabyte list of known results that allows cryptographers to deduce the unique key that encrypts a given conversation - was developed by volunteers around the globe using giant clusters of computers and gaming consoles.

Within days of the project announcement in August, the GSMA pooh-poohed it as a "theoretical compromise" that would have little practical effect on the security of phone calls. In addition to the massive rainbow table needed, the GSMA said it doubted researchers had the means to process the vast amounts of raw radio data involved.

"Initially, we didn't consider channel-hopping a big security feature," Nohl told The Register. "If the GSM Association's excuse for bad crypto is there is another security feature we rely on much more, then of course, we'll break that, too."

A bare-bones attack can be pulled off with a PC with a medium-end graphics card, a large hard drive, two USRP2 receivers and the channel-hopping software. Under normal conditions, it will take a few minutes of conversation before eavesdroppers have collected enough data to break the encryption. Because the calls are recorded and played back later, the entire contents of a conversation can still be captured.

More elaborate setups that use a network of computers or Field Programmable Gate Array devices, will be able to unlock calls almost instantaneously, Nohl said.

To capture both ends of a conversation, an attacker would have to place one of the radios in close proximity to the person making the call, while the second would be used to capture downlink transmissions coming from a carrier's base station. That requires a fair amount of effort because attackers must target a specific individual.

But in many cases - such as phone menus used by banks and airline companies - it's sufficient for an attacker to intercept only the downlink, said David Burgess, a signal processing engineer who helped to identify weaknesses used to break A5/1.

"Even if I only see the downlink, that's still very useful," he said. "The base station is acknowledging back every button press."

After weaknesses in A5/1 became common knowledge, mobile operators devised A5/3, an algorithm that requires about a quintillion times more mathematical operations to break. Despite estimates that some 40 percent of cellphones are capable of using the newer cipher, it has yet to be adopted, largely, Nohl says, because of the cost of upgrading and fears older handsets will be left behind.

"A5/3 is a better encryption algorithm and there has been a long-standing proposal to make this the preferred cipher in GSM," he said. "But no network operator with one exception that I'm aware of has started adopting A5/3 so far."

The GSMA has said it plans to transition to the new technology, but has yet to provide a timetable.

Nohl described the channel-hopping techniques at the 26th Chaos Communication Congress, an annual hacker conference in Berlin, along with fellow reverse engineer Chris Paget. Their presentation is here. ®
The Register article is pretty well written and hits the relevant parts of this. It's not an immediate end of the world, but it's not trivial either.

But you can bet everything you own that a lot of intelligence services are going to be perusing this quite thoroughly and implement in practice as soon as they can.
Warwolf Urban Combat Specialist

Why is it so goddamned hard to get little assholes like you to admit it when you fuck up? Is it pride? What gives you the right to have any pride?
–Darth Wong to vivftp

GOP message? Why don't they just come out of the closet: FASCISTS R' US –Patrick Degan

The GOP has a problem with anyone coming out of the closet. –18-till-I-die
User avatar
phongn
Rebel Leader
Posts: 18487
Joined: 2002-07-03 11:11pm

Re: GSM encryption code deciphered, published

Post by phongn »

Bounty wrote:It's a nice publicity stunt for Mr Nohl, I suppose. Too bad he hasn't actually proven anything and done even less of a service to society. The current system too fifteen years to crack and even then you need expensive equipment, in-depth expertise and an ability to pick out the exact signal you need to tap into, which is beyond the means of pretty much anyone who wouldn't have other means of surveillance... and this is supposed to be a problem?
Just like the attacks on WEP and MD5, right?
This is akin to someone repeatedly hitting his watch with a hammer and then complaining it's broken. Well, yes, if you throw inordinate amounts of effort into a futile undertaking you may at some point succeed... but if you're the only nut who wastes his time on that nonsense you're not exactly proving a point RE: the real world.
Maybe you should learn about security.
User avatar
CmdrWilkens
Emperor's Hand
Posts: 9093
Joined: 2002-07-06 01:24am
Location: Land of the Crabcake
Contact:

Re: GSM encryption code deciphered, published

Post by CmdrWilkens »

Edi wrote:The Register article is pretty well written and hits the relevant parts of this. It's not an immediate end of the world, but it's not trivial either.

But you can bet everything you own that a lot of intelligence services are going to be perusing this quite thoroughly and implement in practice as soon as they can.
Given that several of the largest GSM operators do contract work for their relative intelligence agencies does anyone doubt that, say, AT&T hasn't already just handed the damn encryption scheme over to the NSA for them to use and done so a dozen years ago? I'd almost be disappointed if my billions of taxpayer dollars in surveillance technology weren't already capable of doing this.
Image
SDNet World Nation: Wilkonia
Armourer of the WARWOLVES
ASVS Vet's Association (Class of 2000)
Former C.S. Strowbridge Gold Ego Award Winner
MEMBER of the Anti-PETA Anti-Facist LEAGUE

"I put no stock in religion. By the word religion I have seen the lunacy of fanatics of every denomination be called the will of god. I have seen too much religion in the eyes of too many murderers. Holiness is in right action, and courage on behalf of those who cannot defend themselves, and goodness. "
-Kingdom of Heaven
User avatar
Edi
Dragonlord
Dragonlord
Posts: 12461
Joined: 2002-07-11 12:27am
Location: Helsinki, Finland

Re: GSM encryption code deciphered, published

Post by Edi »

CmdrWilkens wrote:
Edi wrote:The Register article is pretty well written and hits the relevant parts of this. It's not an immediate end of the world, but it's not trivial either.

But you can bet everything you own that a lot of intelligence services are going to be perusing this quite thoroughly and implement in practice as soon as they can.
Given that several of the largest GSM operators do contract work for their relative intelligence agencies does anyone doubt that, say, AT&T hasn't already just handed the damn encryption scheme over to the NSA for them to use and done so a dozen years ago? I'd almost be disappointed if my billions of taxpayer dollars in surveillance technology weren't already capable of doing this.
Sure, I expect American operators to have provided US intel services all relevant codes. What do you think are the probabilities of them having similar access in UK/France/Germany/Finland/Other places? Except now they can do that too. Which means that you can conduct this sort of operations abroad and actually get results for cheap. The Russians and Chinese are also so going to abuse the fuck out of this as long as they are able.
Warwolf Urban Combat Specialist

Why is it so goddamned hard to get little assholes like you to admit it when you fuck up? Is it pride? What gives you the right to have any pride?
–Darth Wong to vivftp

GOP message? Why don't they just come out of the closet: FASCISTS R' US –Patrick Degan

The GOP has a problem with anyone coming out of the closet. –18-till-I-die
User avatar
CmdrWilkens
Emperor's Hand
Posts: 9093
Joined: 2002-07-06 01:24am
Location: Land of the Crabcake
Contact:

Re: GSM encryption code deciphered, published

Post by CmdrWilkens »

Edi wrote:
CmdrWilkens wrote:
Edi wrote:The Register article is pretty well written and hits the relevant parts of this. It's not an immediate end of the world, but it's not trivial either.

But you can bet everything you own that a lot of intelligence services are going to be perusing this quite thoroughly and implement in practice as soon as they can.
Given that several of the largest GSM operators do contract work for their relative intelligence agencies does anyone doubt that, say, AT&T hasn't already just handed the damn encryption scheme over to the NSA for them to use and done so a dozen years ago? I'd almost be disappointed if my billions of taxpayer dollars in surveillance technology weren't already capable of doing this.
Sure, I expect American operators to have provided US intel services all relevant codes. What do you think are the probabilities of them having similar access in UK/France/Germany/Finland/Other places? Except now they can do that too. Which means that you can conduct this sort of operations abroad and actually get results for cheap. The Russians and Chinese are also so going to abuse the fuck out of this as long as they are able.
GSM, if the number is correct, is used by roughly 80% of the world's mobile operators. If services like Vodafone, Virgin Mobile, etc, etc ad nauseum aren't also being co-opted by their relative national intelligence services I would be surprised.
Image
SDNet World Nation: Wilkonia
Armourer of the WARWOLVES
ASVS Vet's Association (Class of 2000)
Former C.S. Strowbridge Gold Ego Award Winner
MEMBER of the Anti-PETA Anti-Facist LEAGUE

"I put no stock in religion. By the word religion I have seen the lunacy of fanatics of every denomination be called the will of god. I have seen too much religion in the eyes of too many murderers. Holiness is in right action, and courage on behalf of those who cannot defend themselves, and goodness. "
-Kingdom of Heaven
User avatar
Bounty
Emperor's Hand
Posts: 10767
Joined: 2005-01-20 08:33am
Location: Belgium

Re: GSM encryption code deciphered, published

Post by Bounty »

phongn wrote:
Bounty wrote:It's a nice publicity stunt for Mr Nohl, I suppose. Too bad he hasn't actually proven anything and done even less of a service to society. The current system too fifteen years to crack and even then you need expensive equipment, in-depth expertise and an ability to pick out the exact signal you need to tap into, which is beyond the means of pretty much anyone who wouldn't have other means of surveillance... and this is supposed to be a problem?
Just like the attacks on WEP and MD5, right?
This is akin to someone repeatedly hitting his watch with a hammer and then complaining it's broken. Well, yes, if you throw inordinate amounts of effort into a futile undertaking you may at some point succeed... but if you're the only nut who wastes his time on that nonsense you're not exactly proving a point RE: the real world.
Maybe you should learn about security.
How is this making anything more secure? He could have limited the disclosure to the telecom operators in order to show them they need to roll out better encryption... except he'd rather be a malevolent douche and puts everything on Bittorrent. Where it has now lowered the threshold for GSM eavesdropping considerably.

See, I realise that any sort of security is only as good as the smartest person trying to break it, and if GSM can really be decrypted with ease then that security should be improved. But if it took fifteen years to come up with a reliable way of decryption, one that still requires more equipment and expertise than many people would be willing to commit, it seems like this Nohl character has been working less to make the world a better place and more to get himself into the news with a story that sounds juicier than it actually is, and with some home-made drama tacked on by himself. That is not whatb I'd call a person who wants to make communications more secure out of altruism, that's a troll.
User avatar
phongn
Rebel Leader
Posts: 18487
Joined: 2002-07-03 11:11pm

Re: GSM encryption code deciphered, published

Post by phongn »

CmdrWilkens wrote:Given that several of the largest GSM operators do contract work for their relative intelligence agencies does anyone doubt that, say, AT&T hasn't already just handed the damn encryption scheme over to the NSA for them to use and done so a dozen years ago? I'd almost be disappointed if my billions of taxpayer dollars in surveillance technology weren't already capable of doing this.
The algorithm was leaked in 1994, anyways.
Edi wrote:Sure, I expect American operators to have provided US intel services all relevant codes. What do you think are the probabilities of them having similar access in UK/France/Germany/Finland/Other places? Except now they can do that too. Which means that you can conduct this sort of operations abroad and actually get results for cheap. The Russians and Chinese are also so going to abuse the fuck out of this as long as they are able.
I'd expect every major SIGINT/ELINT outfit to be able to do this already. Failing that, you can just tap the wireline portion of the network.
Edi wrote:That particular article leaves out any mention of A5/3, which is orders of magnitude more difficult to hack. It's ready for implementation, but only one operator uses that as of now.
A5/3 is harder but there is continuing work on breaking it and it inherits some weaknesses from A5/1.
Bounty wrote:How is this making anything more secure? He could have limited the disclosure to the telecom operators in order to show them they need to roll out better encryption... except he'd rather be a malevolent douche and puts everything on Bittorrent. Where it has now lowered the threshold for GSM eavesdropping considerably.

See, I realise that any sort of security is only as good as the smartest person trying to break it, and if GSM can really be decrypted with ease then that security should be improved. But if it took fifteen years to come up with a reliable way of decryption, one that still requires more equipment and expertise than many people would be willing to commit, it seems like this Nohl character has been working less to make the world a better place and more to get himself into the news with a story that sounds juicier than it actually is, and with some home-made drama tacked on by himself. That is not whatb I'd call a person who wants to make communications more secure out of altruism, that's a troll.
That's how the whole public crypto research field operates, Bounty. Attacks are published early and often (including the ones that broke WEP and MD5, and the continuing attacks against SHA-1). That generally includes supporting material (in this case, the rainbow table).
User avatar
Edi
Dragonlord
Dragonlord
Posts: 12461
Joined: 2002-07-11 12:27am
Location: Helsinki, Finland

Re: GSM encryption code deciphered, published

Post by Edi »

Bounty wrote:How is this making anything more secure? He could have limited the disclosure to the telecom operators in order to show them they need to roll out better encryption... except he'd rather be a malevolent douche and puts everything on Bittorrent. Where it has now lowered the threshold for GSM eavesdropping considerably.
Have you read the responses from the organization of the telephone operators? Do so. Then read over your post again and you may realize just how stupid it is. Public disclosure is going to force the hand of telecommunications providers and they will need to update their networks to the A5/3 standard, which will then take care of the problem. In the meanwhile there will at least be awareness of the problem.
Bounty wrote:See, I realise that any sort of security is only as good as the smartest person trying to break it, and if GSM can really be decrypted with ease then that security should be improved. But if it took fifteen years to come up with a reliable way of decryption, one that still requires more equipment and expertise than many people would be willing to commit,
Tell me, did somebody add extra stupid to your morning coffee today? Since when is $2000-$4000 a lot of money? For an individual private citizen, yeah. For any mid-sized company or larger, to say nothing of national intelligence services, it's less than a rounding error when compared to what can be gotten out of it.

It's a huge, glaring national security risk for entire countries not to have this shit upgraded and it won't be unless there is awareness of it.
Bounty wrote:it seems like this Nohl character has been working less to make the world a better place and more to get himself into the news with a story that sounds juicier than it actually is, and with some home-made drama tacked on by himself. That is not whatb I'd call a person who wants to make communications more secure out of altruism, that's a troll.
Once you learn why security through obscurity is a bad idea and get a better working idea of how GSM networks operate and what the actual implications of this are, you're welcome to participate. In the meanwhile please stay silent while the adults talk.
Warwolf Urban Combat Specialist

Why is it so goddamned hard to get little assholes like you to admit it when you fuck up? Is it pride? What gives you the right to have any pride?
–Darth Wong to vivftp

GOP message? Why don't they just come out of the closet: FASCISTS R' US –Patrick Degan

The GOP has a problem with anyone coming out of the closet. –18-till-I-die
User avatar
Edi
Dragonlord
Dragonlord
Posts: 12461
Joined: 2002-07-11 12:27am
Location: Helsinki, Finland

Re: GSM encryption code deciphered, published

Post by Edi »

phongn wrote:
Edi wrote:Sure, I expect American operators to have provided US intel services all relevant codes. What do you think are the probabilities of them having similar access in UK/France/Germany/Finland/Other places? Except now they can do that too. Which means that you can conduct this sort of operations abroad and actually get results for cheap. The Russians and Chinese are also so going to abuse the fuck out of this as long as they are able.
I'd expect every major SIGINT/ELINT outfit to be able to do this already. Failing that, you can just tap the wireline portion of the network.
True. This encryption is just on the MS/BS link, so the wireline is not secure.
phongn wrote:
Edi wrote:That particular article leaves out any mention of A5/3, which is orders of magnitude more difficult to hack. It's ready for implementation, but only one operator uses that as of now.
A5/3 is harder but there is continuing work on breaking it and it inherits some weaknesses from A5/1.
I'll take your word for that. You know more about it than I do.
Warwolf Urban Combat Specialist

Why is it so goddamned hard to get little assholes like you to admit it when you fuck up? Is it pride? What gives you the right to have any pride?
–Darth Wong to vivftp

GOP message? Why don't they just come out of the closet: FASCISTS R' US –Patrick Degan

The GOP has a problem with anyone coming out of the closet. –18-till-I-die
User avatar
Uraniun235
Emperor's Hand
Posts: 13772
Joined: 2002-09-12 12:47am
Location: OREGON
Contact:

Re: GSM encryption code deciphered, published

Post by Uraniun235 »

Edi wrote:That particular article leaves out any mention of A5/3, which is orders of magnitude more difficult to hack. It's ready for implementation, but only one operator uses that as of now.
Hmm. I must have neglected that, I copied the article from a thread at another forum and so my comprehension of what exactly was in the article was muddied by the other remarks in that thread. Sorry.

The biggest issue appears to be that a rollout of A5/3 doesn't appear to have been planned for the near future, and that even if immediate replacement was mandated, it could take over a year to do so based on how the replacement of A5/2 proceeded.
Bounty wrote:But if it took fifteen years to come up with a reliable way of decryption, one that still requires more equipment and expertise than many people would be willing to commit, it seems like this Nohl character has been working less to make the world a better place and more to get himself into the news with a story that sounds juicier than it actually is, and with some home-made drama tacked on by himself.
It took fifteen years for a team of volunteers with donated resources to accomplish this. Suppose a big company like a defense contractor or an automobile manufacturer or an investment bank - a company with a lot of spare change to throw at hidden projects - quietly hired a couple dozen cryptologists and time on a supercomputer to work on the problem?

Only, now they're the only (private individual) people with the ability to do so. And now their rivals are operating under a false trust of the security of the phone calls they're making. It's not necessarily likely, but it's entirely possible that there are multiple private entities out there that have already had this ability for years, because they had more resources to throw at it.

Exposing flaws in encryption systems is a vital part of assuring our security. The first step doesn't always have to be public, but if the authorities in charge aren't willing to take action on it, then public exposure can be warranted; it provides impetus to fix the problem.
"There is no "taboo" on using nuclear weapons." -Julhelm
Image
What is Project Zohar?
"On a serious note (well not really) I did sometimes jump in and rate nBSG episodes a '5' before the episode even aired or I saw it." - RogueIce explaining that episode ratings on SDN tv show threads are bunk
User avatar
phongn
Rebel Leader
Posts: 18487
Joined: 2002-07-03 11:11pm

Re: GSM encryption code deciphered, published

Post by phongn »

Uraniun235 wrote:Hmm. I must have neglected that, I copied the article from a thread at another forum and so my comprehension of what exactly was in the article was muddied by the other remarks in that thread. Sorry.

The biggest issue appears to be that a rollout of A5/3 doesn't appear to have been planned for the near future, and that even if immediate replacement was mandated, it could take over a year to do so based on how the replacement of A5/2 proceeded.
The sad part is that A5/2 was created due to crypto export restrictions.
User avatar
Aaron
Blackpowder Man
Posts: 12031
Joined: 2004-01-28 11:02pm
Location: British Columbian ExPat

Re: GSM encryption code deciphered, published

Post by Aaron »

phongn wrote:I'd expect every major SIGINT/ELINT outfit to be able to do this already. Failing that, you can just tap the wireline portion of the network.
They can, the CF has been doing it since at least '98 to my knowledge. We had several passwords compromised by chatty officers on cell phones during exercises that year. And IIRC the EW guys mentioned it on my basic RadOp course in '07 as well.
M1891/30: A bad day on the range is better then a good day at work.
Image
User avatar
Skgoa
Jedi Master
Posts: 1389
Joined: 2007-08-02 01:39pm
Location: Dresden, valley of the clueless

Re: GSM encryption code deciphered, published

Post by Skgoa »

The talk the articles refer to can be downloaded here: http://ramses.wh2.tu-dresden.de/pub/mir ... _srsly.mp4 (775.5MB)
They address many of the points made in this thread and the talk is not TO technical.
http://www.politicalcompass.org/test
Economic Left/Right: -7.12
Social Libertarian/Authoritarian: -7.74

This is pre-WWII. You can sort of tell from the sketch style, from thee way it refers to Japan (Japan in the 1950s was still rebuilding from WWII), the spelling of Tokyo, lots of details. Nothing obvious... except that the upper right hand corner of the page reads "November 1931." --- Simon_Jester
User avatar
Aaron
Blackpowder Man
Posts: 12031
Joined: 2004-01-28 11:02pm
Location: British Columbian ExPat

Re: GSM encryption code deciphered, published

Post by Aaron »

Cpl Kendall wrote:
They can, the CF has been doing it since at least '98 to my knowledge. We had several passwords compromised by chatty officers on cell phones during exercises that year. And IIRC the EW guys mentioned it on my basic RadOp course in '07 as well.
Ghetto edit: '07='97. :roll:
M1891/30: A bad day on the range is better then a good day at work.
Image
Post Reply