{"id":111859,"date":"2009-12-29T14:39:32","date_gmt":"2009-12-29T19:39:32","guid":{"rendered":"http:\/\/blogs.discovermagazine.com\/80beats\/?p=8076"},"modified":"2009-12-29T14:39:32","modified_gmt":"2009-12-29T19:39:32","slug":"code-protecting-80-percent-of-cellphone-convos-finally-cracked-80beats","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/111859","title":{"rendered":"Code Protecting 80 Percent of Cellphone Convos Finally Cracked | 80beats"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-8104\" title=\"cellphoneman\" src=\"http:\/\/blogs.discovermagazine.com\/80beats\/files\/2009\/12\/cellphoneman.jpg\" alt=\"cellphoneman\" width=\"220\" height=\"234\" align=\"left\"\/>Are your phone conversations about to become less secure? A German encryption expert says he&#8217;s cracked the two-decade-old algorithm that protects most of the world&#8217;s cellphones: GSM (Global System for Mobile communication).<\/p>\n<p>Karsten Nohl says his intentions were noble; he wanted to show the world that though GSM protects 80 percent of the cellphones in the world, it&#8217;s far from invincible. <span style=\"color:#1c39bb;\">\u201cThis shows that existing G.S.M. security is inadequate,\u201d Mr. Nohl, 28, told about 600 people attending the Chaos Communication Congress, a four-day conference of computer hackers that runs through Wednesday in Berlin. \u201cWe are trying to push operators to adopt better security measures for mobile phone calls&#8221; [<a rel=\"nofollow\"  href=\"http:\/\/www.nytimes.com\/2009\/12\/29\/technology\/29hack.html\"><em>The New York Times<\/em><\/a>]<\/span>.<\/p>\n<p><span id=\"more-8076\"><\/span>Nohl and a team of others had been working independently since August to <a rel=\"nofollow\"  href=\"http:\/\/blogs.discovermagazine.com\/80beats\/tag\/hackers\/\">hack<\/a> the code. <span style=\"color:#1c39bb;\">Developed in 1988, the system prevents the interception of calls by forcing phones and base stations to change frequencies constantly [<a rel=\"nofollow\"  href=\"http:\/\/www.guardian.co.uk\/technology\/2009\/dec\/29\/gsm-mobile-algorithm-cracked-nohl\"><em>The Guardian<\/em><\/a>]<\/span>. Nohl and the others generated countless random code combinations until they&#8217;d completed an encryption code book. <span style=\"color:#1c39bb;\">As an analogy, think of encryption like a jigsaw puzzle where you have to find one specific puzzle piece. If the puzzle only has 25 pieces, it won&#8217;t take you too long to accomplish. That is like a weak encryption algorithm. However, if the puzzle has 10,000 pieces it will take significantly longer [<a rel=\"nofollow\"  href=\"http:\/\/www.pcworld.com\/businesscenter\/article\/185552\/gsm_encryption_cracked_showing_its_age.html\"><em>PC World<\/em><\/a>]<\/span>.<\/p>\n<p>Despite the fact that it took 21 years before someone figured out their jigsaw puzzle, GSM&#8217;s creators at the GSM Association aren&#8217;t pleased. <span style=\"color:#1c39bb;\">&#8220;We consider this research, which appears to be motivated in part by commercial considerations, to be a long way from being a practical attack on GSM,&#8221; said Claire Cranton, a spokeswoman. &#8220;To do this while supposedly being concerned about privacy is beyond me&#8221; [<a rel=\"nofollow\"  href=\"http:\/\/www.guardian.co.uk\/technology\/2009\/dec\/29\/gsm-mobile-algorithm-cracked-nohl\"><em>The Guardian<\/em><\/a>]<\/span>.<\/p>\n<p>While Nohl claims his works was academic and GSM spokespeople say it&#8217;s not a threat, not everyone is convinced it&#8217;s so harmless. <span style=\"color:#1c39bb;\">Law enforcement officials and well-financed cyber criminals have been able to crack GSM encryption for sometime, but the investment was so high that it didn&#8217;t pose much of a threat. This new method lowers the price of entry to the point that it is more of an issue, but still not a high risk [<a rel=\"nofollow\"  href=\"http:\/\/www.pcworld.com\/businesscenter\/article\/185552\/gsm_encryption_cracked_showing_its_age.html\"><em>PC World<\/em><\/a>]<\/span>.<\/p>\n<p>Related Content:<br \/>\n80beats: <a rel=\"nofollow\"  href=\"http:\/\/blogs.discovermagazine.com\/80beats\/2009\/12\/17\/a-hack-of-the-drones-insurgents-spy-on-spy-planes-with-26-software\/\">A Hack of the Drones: Insurgents Spy on Spy Plans with $26 Software<\/a><br \/>\n80beats: <a rel=\"nofollow\"  href=\"http:\/\/blogs.discovermagazine.com\/80beats\/2009\/12\/09\/editing-goof-puts-tsa-airport-screening-secrets-on-the-web\/\">Editing Goof Puts TSA Airport Screening Secrets on the Web<\/a><br \/>\n80beats: <a rel=\"nofollow\"  href=\"http:\/\/blogs.discovermagazine.com\/80beats\/2009\/11\/11\/how-to-prevent-heart-hackers-from-turning-off-pacemakers\/\">How to Prevent Heart Hackers from Turning Off Pacemakers<\/a><br \/>\n80beats: <a rel=\"nofollow\"  href=\"http:\/\/blogs.discovermagazine.com\/80beats\/2009\/04\/08\/electrical-espionage-spies-hack-into-the-us-power-grid\/\">Electrical Espionage: Spies Hack Into the U.S. Power Grid<\/a><\/p>\n<p><em>Image: flickr \/ <a rel=\"nofollow\"  href=\"http:\/\/www.flickr.com\/photos\/yourdon\/\">Ed Yourdon<\/a><\/em><\/p>\n<p><a rel=\"nofollow\"  href=\"http:\/\/feedads.g.doubleclick.net\/~a\/5N3QCELB6961bit1VQrzmbafWJw\/0\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~a\/5N3QCELB6961bit1VQrzmbafWJw\/0\/di\" border=\"0\" ismap><\/a><br \/>\n<a rel=\"nofollow\"  href=\"http:\/\/feedads.g.doubleclick.net\/~a\/5N3QCELB6961bit1VQrzmbafWJw\/1\/da\"><img decoding=\"async\" src=\"http:\/\/feedads.g.doubleclick.net\/~a\/5N3QCELB6961bit1VQrzmbafWJw\/1\/di\" border=\"0\" ismap><\/a><\/p>\n<div class=\"feedflare\">\n<a rel=\"nofollow\"  href=\"http:\/\/feeds.feedburner.com\/~ff\/80beats?a=uv1i5WoJoB4:emks4gOkSyo:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/80beats?d=yIl2AUoC8zA\" border=\"0\"><\/a> <a rel=\"nofollow\"  href=\"http:\/\/feeds.feedburner.com\/~ff\/80beats?a=uv1i5WoJoB4:emks4gOkSyo:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/80beats?i=uv1i5WoJoB4:emks4gOkSyo:V_sGLiPBpWU\" border=\"0\"><\/a> <a rel=\"nofollow\"  href=\"http:\/\/feeds.feedburner.com\/~ff\/80beats?a=uv1i5WoJoB4:emks4gOkSyo:gIN9vFwOqvQ\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/80beats?i=uv1i5WoJoB4:emks4gOkSyo:gIN9vFwOqvQ\" border=\"0\"><\/a> <a rel=\"nofollow\"  href=\"http:\/\/feeds.feedburner.com\/~ff\/80beats?a=uv1i5WoJoB4:emks4gOkSyo:F7zBnMyn0Lo\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/80beats?i=uv1i5WoJoB4:emks4gOkSyo:F7zBnMyn0Lo\" border=\"0\"><\/a>\n<\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/80beats\/~4\/uv1i5WoJoB4\" height=\"1\" width=\"1\"\/><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/DiscoverMag\/~4\/3S_XKuYkiLI\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are your phone conversations about to become less secure? A German encryption expert says he&#8217;s cracked the two-decade-old algorithm that protects most of the world&#8217;s cellphones: GSM (Global System for Mobile communication). Karsten Nohl says his intentions were noble; he wanted to show the world that though GSM protects 80 percent of the cellphones in [&hellip;]<\/p>\n","protected":false},"author":641,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-111859","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/111859","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/641"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=111859"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/111859\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=111859"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=111859"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=111859"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}