Title :
Another attack on A5/1
Author :
Ekdahl, Patrik ; Johansson, Thomas
Author_Institution :
Dept. of Inf. Technol., Lund Univ., Sweden
fDate :
1/1/2003 12:00:00 AM
Abstract :
A5/1 is a stream cipher used in the Global System for Mobile Communications (GSM) standard. Several time-memory tradeoff attacks against A5/1 have been proposed, most notably the attack by Biryukov, Shamir and Wagner (1978), which can break A5/1 in seconds using huge precomputation time and memory. This article presents a completely different attack on A5/1, based on ideas from correlation attacks. Whereas time-memory tradeoff attacks have a complexity which is exponential with the shift-register length, the complexity of the proposed attack is almost independent of the shift-register length. Our implementation of the suggested attack breaks A5/1 in a few minutes using 2-5 min of conversation plaintext.
Keywords :
cellular radio; correlation methods; cryptography; telecommunication standards; A5/1 stream cipher; GSM standard; Global System for Mobile Communications; conversation plaintext; correlation attacks; cryptanalysis; encryption algorithm; exponential complexity; precomputation time; shift-register length; simulations; time-memory tradeoff attacks; Clocks; Communication standards; Cryptography; Data communication; GSM; Information technology; Information theory; Linear feedback shift registers; Privacy; Shift registers;
Journal_Title :
Information Theory, IEEE Transactions on
DOI :
10.1109/TIT.2002.806129