From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
To: cypherpunks@toad.com
Message Hash: 9b4497d8c6c39f3376c44330e7c63d3ff16fcab280f3b98fafc7e07463a54fc4
Message ID: <199804211916.VAA18518@public.uni-hamburg.de>
Reply To: N/A
UTC Datetime: 1998-04-21 19:56:13 UTC
Raw Date: Tue, 21 Apr 1998 12:56:13 -0700 (PDT)
From: ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)
Date: Tue, 21 Apr 1998 12:56:13 -0700 (PDT)
To: cypherpunks@toad.com
Subject: Re: GSM Security Study
Message-ID: <199804211916.VAA18518@public.uni-hamburg.de>
MIME-Version: 1.0
Content-Type: text/plain
> To assess this spin we offer extracts of a 1998 GSM System
> Security Study:
>
> http://jya.com/gsm061088.htm (44K + 3 images)
Looks like that is the 'two brown envelopes' doc from which Ross Anderson
reconstructed the A5 algorithm as reprinted in Applied Cryptography.
Racal Research writes that there were French, Swedish and British
proposals. Ross indicated that the French one was chosen as A5, while
Julian Assange says that two different "A5" algorithms are in use.
What happened to the Swedish and the UK proposal?
Do you also have Appendix A and Section 8 of the A5 analysis?
They write that COMP128 was proposed 'by the German administration'.
Does anyone know which role the BSI (then called ZfCh) played in the
design of this algorithm?
Return to April 1998
Return to “ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)”
1998-04-21 (Tue, 21 Apr 1998 12:56:13 -0700 (PDT)) - Re: GSM Security Study - ulf@fitug.de (Ulf =?iso-8859-1?Q?M=F6ller?=)