Abstracts

 
 
 
 
 
 
 
 
 
 
 

  A Real-World Attack Breaking A5/1 within Hours

  T. Gendrullis, M. Novotny, A. Rupp

 
A5/1 is a stream cipher used for securing GSM communication in most countries all over the world. Although it has been intensively analyzed in the past none of the proposed attacks against A5/1 has been fully implemented. We present an attack based on the work by Keller and Seitz which reduces the complexity of a plain brute force attack significantly by early recognizing contradictions while guessing the initial state of A5/1. We implemented our attack on a special purpose hardware device called COPACOBANA. With the knowledge of only 64 bits of keystream we are now able to reveal the corresponding internal 64-bit state of the cipher in about 7 hours on average. Furthermore, we present an architectural optimization of our hardware design that leads again to an improvement of about 16% in computation time.