Description:
This talk titled "
Cracking A5 GSM encryption" was given by Karsten at
Hacking at Random (HAR) 2009.
The A5/1 algorithm is one of the ciphers used in GSM networks. It is used to encrypt both voice and signaling data.In the GSM network, A5/1 is applied both in the handset and the BTS on the corner of the network. The first phase of communication including radio resource allocation and authentication is unencrypted. Dialing and voice is encrypted. The attack on the A5/1 demoed at HAR 2009 is a reimplementation of the attack by THC, which was done in early 2008. Their approach differs slightly, as they use more common hardware to generate the tables, namely graphics cards with GPGPU capability and attempt to build a distributed infrastructure of nodes where each node donates both a small portion of diskspace for a part of the table and some kind of fast hardware for the generation of and lookup in its own table. They also took this project as a motivation to design and code a general purpose TMTO library. The attack itself is still the same and we owe THC much for their pioneering work. Also take a look at http://airprobe.org for information and software on the sniffing of GSM data. You can
download the presentation here. The
project page can be visited here.
Speaker Bio: Karsten is a security researcher and hardware hacker. Karsten's academic research deals with privacy protection, while his hacking projects focus on cryptographic hardware. In the past year, Karsten presented on smart-card security and embedded cryptography at 25C3, USENIX Security, BlackHat, CanSecWest, Toorcon, and the HOPE conference. Karsten is a security researcher and hardware hacker. Karsten's academic research deals with privacy protection, while his hacking projects focus on cryptographic hardware. In the past year, Karsten presented on smart-card security and embedded cryptography at 25C3, USENIX Security, BlackHat, CanSecWest, Toorcon, and the HOPE conference.
Special thanks go out to
@agentgambell for helping us with the video upload.
Tags: basics ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Comments: