2

Click here to load reader

Weakness of 2G mobile phone networks revealed - Phys.org · Weakness of 2G mobile phone networks revealed 21 October 2016 The encryption scheme used for second generation (2G) mobile

Embed Size (px)

Citation preview

Page 1: Weakness of 2G mobile phone networks revealed - Phys.org · Weakness of 2G mobile phone networks revealed 21 October 2016 The encryption scheme used for second generation (2G) mobile

Weakness of 2G mobile phone networksrevealed21 October 2016

The encryption scheme used for secondgeneration (2G) mobile phone data can be hackedwithin seconds by exploiting weaknesses andusing common hardware, A*STAR researchesshow. The ease of the attack shows an urgentneed for the 2G Global System for MobileCommunications (GSM) encryption scheme to beupdated.

GSM was first deployed 25 years ago and hassince become the global standard for mobilecommunications, used in nearly every country andcomprising more than 90 per cent of the globaluser base.

"GSM uses an encryption scheme called the A5/1stream cipher to protect data," explains Jiqiang Lufrom the A*STAR Institute for Infocomm Research."A5/1 uses a 64-bit secret key and a complexkeystream generator to make it resistant toelementary attacks such as exhaustive keysearches and dictionary attacks."

Any encryption scheme can be hacked givensufficient time and data, so security engineersusually try to create an encryption scheme thatwould demand an unfeasible amount of time tocrack. But, as GSM gets older, weaknesses in theA5/1 cipher and advances in technology haverendered GSM communications susceptible toattack.

Straightforward 'brute force' attacks by guessingthe secret key from the data stream are stillintensively time consuming, and although A5/1 wasreported to have been successfully attacked in2010, the details of the attack were kept secret. Byexploiting weaknesses in the A5/1 cipher, Lu andhis colleagues have now demonstrated the firstreal-time attack using a relatively small amount ofdata.

"We used a rainbow table, which is constructediteratively offline as a set of chains relating the

secret key to the cipher output," says Lu. "When anoutput is received during an attack, the attackeridentifies the relevant chain in the rainbow tableand regenerates it, which gives a result that is verylike to be the secret key of the cipher."

Using two specific exploits, Lu's team was able toreduce the effective complexity of the key to a levelthat allowed a rainbow table to be constructed in 55days using consumer computer hardware, makingpossible a successful online attack, in most caseswithin just nine seconds.

"GSM is still widely used in telecommunications,but its A5/1 encryption system is now veryinsecure," says Lu. "Our results show that GSM's64-bit key encryption is no longer sufficient andshould be upgraded to a stronger scheme as amatter of urgency."

More information: Time–Memory Trade-OffAttack on the GSM A5/1 Stream Cipher UsingCommodity GPGPU. Applied Cryptography andNetwork Security. DOI:10.1007/978-3-319-28166-7_17

Provided by Agency for Science, Technology andResearch (A*STAR), Singapore

1 / 2

Page 2: Weakness of 2G mobile phone networks revealed - Phys.org · Weakness of 2G mobile phone networks revealed 21 October 2016 The encryption scheme used for second generation (2G) mobile

APA citation: Weakness of 2G mobile phone networks revealed (2016, October 21) retrieved 6 July 2018from https://phys.org/news/2016-10-weakness-2g-mobile-networks-revealed.html

This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, nopart may be reproduced without the written permission. The content is provided for information purposes only.

Powered by TCPDF (www.tcpdf.org)

2 / 2