Another attack on A5/1

被引:63
作者
Ekdahl, P [1 ]
Johansson, T [1 ]
机构
[1] Lund Univ, Dept Informat Technol, S-22100 Lund, Sweden
关键词
A5/1; correlation attacks; cryptanalysis; GSM; stream ciphers;
D O I
10.1109/TIT.2002.806129
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A5/1 is a stream cipher used in the Global System for Mobile Communications (GSM) standard. Several time-memory tradeoff attacks against A5/1 have been proposed, most notably the recent attack by Biryukov, Shamir, and Wagner, which can break A5/1 in seconds using huge precomputation time and memory. This correspondence presents a completely different attack on A5/1, based on ideas from correlation attacks. Whereas time-memory tradeoff attacks have a complexity which is exponential with the shift-register length, the complexity of the proposed attack is almost independent of the shift-register length. Our implementation of the suggested attack breaks A5/1 in a few minutes using 2-5 min of conversation plaintext.
引用
收藏
页码:284 / 289
页数:6
相关论文
共 8 条
[1]  
Biham E., 2000, Progress in Cryptology - INDOCRYPT 2000. First International Conference in Cryptology in India. Proceedings (Lecture Notes in Computer Science Vol.1977), P43
[2]  
Biryukov A., 2001, Fast Software Encryption. 7th International Workshop, FSE 2000. Proceedings (Lecture Notes in Computer Science Vol.1978), P1
[3]  
BRICENO M, 1999, PEDAGOGICAL IMPLEMEN
[4]  
GOLIC JD, 1997, LNCS, V1233, P239, DOI DOI 10.1007/3-540-69053-0
[5]  
Johansson T, 1999, LECT NOTES COMPUT SC, V1592, P347
[6]  
KRAUSE M, 2002, EUROCRYPT 2002
[7]  
Meier W., 1989, Journal of Cryptology, V1, P159, DOI 10.1007/BF02252874
[8]  
Menezes A. J, 1997, HDB APPL CRYPTOGRAPH