Attacks On Gsm Standards : Attack Against Mobile Communication

1544 Words7 Pages
Attacks on GSM Standards: Attacks against mobile communication are not only depends on the network weaknesses but the reasons may be mobile phones malware, identity theft by SIM cloning and so on. Some other attacks, such as phishing with SMS, may exploit human factors as well. But most of these attacks are done on the A5 family of ciphering algorithms. The exact formulation of these algorithm is still unknown but many researchers try to calculate it through reverse engineering and cryptanalysis. Some of the attacks done on A5 are discuss below, that can be distinguished as passive and active attacks. PASSIVE ATTACKS: After the general configuration of A5/1 was released, a few shortcomings of this calculation have Been uncovered by mainstream researchers. The primary assault focusing on the A5/1 calculation has been proposed by Golic [Golic 1997], which presented a successful Time-Memory Trade-Off (TMTO) assault in light of the birthday Catch 22. This method is pertinent to any cryptosystem with a generally little number of inner states like A5/1, which has 264 states characterized by three movement registers. The essential thought of the TMTO is to pre-process a huge set of states A, and to consider the arrangement of states B through which the calculation advances amid the era of yield bits. Any crossing point in the middle of A and B permits the distinguishing proof of a genuine condition of the calculation. The proposed assault would be practicable just having
Get Access