• DocumentCode
    3487595
  • Title

    A time memory trade off attack against A5/1 algorithm

  • Author

    Erguler, I. ; Karahisar, Alper ; Anarim, Emin

  • Author_Institution
    Bogazici Univ., Istanbul, Turkey
  • fYear
    2004
  • fDate
    28-30 April 2004
  • Firstpage
    684
  • Lastpage
    687
  • Abstract
    Two types of attacks against the GSM security algorithm, A5/1, are discussed. The A5/1 system consists of three LFSRs (linear feedback shift registers) which have lengths of 19, 22 and 23 bits respectively. So, the total length of the three registers is 64 bits. The purpose of these attacks is to obtain the initial state of the LFSRs just after the encryption key (Kc) and frame number are loaded, in the light of known plaintext. Both attacks depend on the time-memory attack principle. In other words, the solution space of A5/1, as 264, becomes realizable with M ≈ 234.955 as memory and T ≈ 228.365 as time complexity by distributing the solution space between time and memory optimally.
  • Keywords
    cellular radio; computational complexity; cryptography; shift registers; telecommunication security; A5/1 algorithm; GSM security algorithm; LFSR; encryption key; frame number; linear feedback shift registers; time memory trade off attack; time-memory attack; Cryptography; Feedback; GSM; Security; Shift registers;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Signal Processing and Communications Applications Conference, 2004. Proceedings of the IEEE 12th
  • Print_ISBN
    0-7803-8318-4
  • Type

    conf

  • DOI
    10.1109/SIU.2004.1338623
  • Filename
    1338623