{"id":110486,"date":"2009-12-29T04:33:54","date_gmt":"2009-12-29T09:33:54","guid":{"rendered":"http:\/\/www.stoth.com\/2009\/12\/29\/gsm-call-encryption-code-cracked-published-for-the-whole-world-to-see\/"},"modified":"2009-12-29T04:33:54","modified_gmt":"2009-12-29T09:33:54","slug":"gsm-call-encryption-code-cracked-published-for-the-whole-world-to-see","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/110486","title":{"rendered":"GSM call encryption code cracked, published for the whole world to see"},"content":{"rendered":"<p><\/p>\n<div><a href=\"http:\/\/www.nytimes.com\/2009\/12\/29\/technology\/29hack.html\"><img decoding=\"async\" vspace=\"4\" hspace=\"4\" border=\"1\" alt=\"\" src=\"http:\/\/www.blogcdn.com\/www.engadget.com\/media\/2009\/12\/29dec901hbcu3.jpg\" \/><\/a><\/div>\n<p>Did you know that the vast majority of calls carried out on the 3.5 billion GSM connections in the world today are protected by a 21-year old 64-bit <a href=\"http:\/\/www.engadget.com\/tag\/encryption\">encryption<\/a> algorithm? You should now, given that the A5\/1 privacy algorithm, devised in 1988, has been deciphered by German computer engineer Karsten Nohl and published as a torrent for fellow code cracking enthusiasts and less benevolent forces to exploit. Worryingly, Karsten and his crew of merry men obtained the binary codes by simple brute force &#8212; they fed enough random strings of numbers in to effectively guess the password. The <a href=\"http:\/\/www.engadget.com\/tag\/gsmassociation\">GSM Association<\/a> &#8212; which has had a 128-bit A5\/3 key available since 2007, but found little takeup from operators &#8212; has responded by having a whinge about Mr. Nohl&#8217;s intentions and stating that operators could just modify the existing code to re-secure their networks. Right, only a modified 64-bit code is just as vulnerable to cracking as the one that just got cracked. It&#8217;s important to note that simply having the code is not in itself enough to eavesdrop on a call, as the cracker would be faced with just a vast stream of digital communications &#8212; but Karsten comes back to reassure us that intercepting software is already available in customizable open source varieties. So don&#8217;t be like Tiger, keep your truly private conversations off the airwaves, at least for a while.<\/p>\n<p><a href=\"http:\/\/www.engadget.com\/2009\/12\/29\/gsm-call-encryption-code-cracked-published-for-the-whole-world\/\">GSM call encryption code cracked, published for the whole world to see<\/a> originally appeared on <a href=\"http:\/\/www.engadget.com\">Engadget<\/a> on Tue, 29 Dec 2009 04:18:00 EST.  Please see our <a href=\"http:\/\/www.weblogsinc.com\/feed-terms\/\">terms for use of feeds<\/a>.<\/p>\n<h6><\/h6>\n<p><a href=\"http:\/\/www.engadget.com\/2009\/12\/29\/gsm-call-encryption-code-cracked-published-for-the-whole-world\/\" rel=\"bookmark\" title=\"Permanent link to this entry\">Permalink<\/a>&nbsp;<img decoding=\"async\" class=\"img_label\" src=\"http:\/\/www.blogsmithmedia.com\/www.engadget.com\/media\/post_label_VIA.gif\" alt=\"\" \/><span><a href=\"http:\/\/www.phonenews.com\/gsm-voice-call-encryption-cracked-in-berlin-9839\/\">Phone News<\/a><!--\/\/--><\/span> &nbsp;|&nbsp; <img decoding=\"async\" class=\"img_label\" src=\"http:\/\/www.blogsmithmedia.com\/www.engadget.com\/media\/post_label_source.gif\" alt=\"source\" \/><span><a href=\"http:\/\/www.nytimes.com\/2009\/12\/29\/technology\/29hack.html\">New York Times<\/a><!--\/\/--><\/span> &nbsp;|&nbsp;<a href=\"http:\/\/www.engadget.com\/forward\/19296484\/\" title=\"Send this entry to a friend via email\">Email this<\/a>&nbsp;|&nbsp;<a href=\"http:\/\/www.engadget.com\/2009\/12\/29\/gsm-call-encryption-code-cracked-published-for-the-whole-world\/#comments\" title=\"View reader comments on this entry\">Comments<\/a> <\/p>\n<p>Buy This Item: <a class=\"buy\" href=\"http:\/\/www.stoth.com\/buy.php\" ><span style=\"color: #33bc03\">[Click here to buy this item]<\/span><\/a><\/p>\n<p><a href=\"http:\/\/www.engadget.com\/2009\/12\/29\/gsm-call-encryption-code-cracked-published-for-the-whole-world\/\" >Article<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Did you know that the vast majority of calls carried out on the 3.5 billion GSM connections in the world today are protected by a 21-year old 64-bit encryption algorithm? You should now, given that the A5\/1 privacy algorithm, devised in 1988, has been deciphered by German computer engineer Karsten Nohl and published as a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-110486","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/110486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=110486"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/110486\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=110486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=110486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=110486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}