1998-10-21 - Status of GSM Crypto Attacks

Header Data

From: John Young <jya@pipeline.com>
To: cypherpunks@toad.com
Message Hash: 95ebf26e8c2cd9a264d5196fb4926581460151c5daa649b39a82de5a4fda8d4b
Message ID: <199810211113.HAA20775@camel7.mindspring.com>
Reply To: N/A
UTC Datetime: 1998-10-21 11:54:42 UTC
Raw Date: Wed, 21 Oct 1998 19:54:42 +0800

Raw message

From: John Young <jya@pipeline.com>
Date: Wed, 21 Oct 1998 19:54:42 +0800
To: cypherpunks@toad.com
Subject: Status of GSM Crypto Attacks
Message-ID: <199810211113.HAA20775@camel7.mindspring.com>
MIME-Version: 1.0
Content-Type: text/plain



Forward from anonymous:

Wed, 21 Oct 98

An engineer at a US wireless telecom and a contributor to 
Cryptologia--has asked me to look into the present status 
of attacks on the GSM encryption schemes:  comp128 (a3a8 
authentication, etc.) and, more importantly, the A5.1 and 
A5.2  voice/data encryption algorithms.

After searching the web, I see that you have similar 
interests in this matter.  I've already sent off inquiries 
to some of the researchers in this area--Ross Anderson, 
Simon Shepherd and the two Berkeley students (Goldberg and 
Wagner).  So far, I've only heard back from Wagner.  Do you 
have anything interesting to say about this matter--has 
anything happened since the Spring?  Has a consensus been 
reached on some of the issues discussed in the 
<http://jya.com/crack-a5.htm> document?

I'm trying to get a handle on the present state-of-the art:  
Where do things presently stand--who is doing the work and 
what, if anything, has been verified/demonstrated?   Has A5 
been cracked?   What can be said about the possibility of 
intercepting and decoding an on-air conversation?







Thread