{"id":183109,"date":"2010-01-15T07:40:51","date_gmt":"2010-01-15T12:40:51","guid":{"rendered":"http:\/\/www.stoth.com\/2010\/01\/15\/3g-gsm-encryption-cracked-in-less-than-two-hours\/"},"modified":"2010-01-15T07:40:51","modified_gmt":"2010-01-15T12:40:51","slug":"3g-gsm-encryption-cracked-in-less-than-two-hours","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/183109","title":{"rendered":"3G GSM encryption cracked in less than two hours"},"content":{"rendered":"<p><\/p>\n<div><a href=\"http:\/\/eprint.iacr.org\/2010\/013\"><img decoding=\"async\" hspace=\"4\" border=\"1\" align=\"right\" vspace=\"4\" src=\"http:\/\/www.blogcdn.com\/www.engadget.com\/media\/2010\/01\/kasumi-01152010_250x271.jpg\" alt=\"\" \/><\/a><\/div>\n<p>Looks like all that GSM code-cracking is progressing faster than we thought. Soon after the discovery of the <a href=\"http:\/\/www.engadget.com\/2009\/12\/29\/gsm-call-encryption-code-cracked-published-for-the-whole-world\/\">64-bit A5\/1 GSM encryption flaw<\/a> last month, the geniuses at Israel&#8217;s Weizmann Institute of Science went ahead and cracked the KASUMI system &#8212; a 128-bit A5\/3 algorithm implemented across 3G networks &#8212; in less than two hours. If you must know, the method applied is dubbed &#8216;related-key sandwich attack&#8217; where multiple values of known differentials are processed through the first seven rounds of KASUMI, then using resulting quartets that are identified sharing key differences, subkey materials can be obtained in round eight to build up the 128-bit key. Sure, it&#8217;s hardly snooping-on-the-go at this speed, but worryingly this was only an &#8216;unoptimized implementation&#8230; on a single PC.&#8217; At the same time, the paper condemns the presumably red-faced <a href=\"http:\/\/www.engadget.com\/tag\/gsmassociation\">GSM Association<\/a> for moving from MISTY &#8212; a more computationally-expensive but much stronger predecessor algorithm &#8212; to KASUMI. Guess we&#8217;ll just have to stick with Skype.<\/p>\n<p><a href=\"http:\/\/www.engadget.com\/2010\/01\/15\/3g-gsm-encryption-cracked-in-less-than-two-hours\/\">3G GSM encryption cracked in less than two hours<\/a> originally appeared on <a href=\"http:\/\/www.engadget.com\">Engadget<\/a> on Fri, 15 Jan 2010 06:45:00 EST.  Please see our <a href=\"http:\/\/www.weblogsinc.com\/feed-terms\/\">terms for use of feeds<\/a>.<\/p>\n<h6><\/h6>\n<p><a href=\"http:\/\/www.engadget.com\/2010\/01\/15\/3g-gsm-encryption-cracked-in-less-than-two-hours\/\" rel=\"bookmark\" title=\"Permanent link to this entry\">Permalink<\/a>&nbsp;<img decoding=\"async\" class=\"img_label\" src=\"http:\/\/www.blogsmithmedia.com\/www.engadget.com\/media\/post_label_VIA.gif\" alt=\"\" \/><span><a href=\"http:\/\/www.phonearena.com\/htmls\/Encryption-used-in-3G-networks-has-been-broken-article-a_8865.html\">PhoneArena<\/a><\/span> &nbsp;|&nbsp; <img decoding=\"async\" class=\"img_label\" src=\"http:\/\/www.blogsmithmedia.com\/www.engadget.com\/media\/post_label_source.gif\" alt=\"source\" \/><span><a href=\"http:\/\/eprint.iacr.org\/2010\/013\">International Association for Cryptologic Research<\/a><!--\/\/--><\/span> &nbsp;|&nbsp;<a href=\"http:\/\/www.engadget.com\/forward\/19317869\/\" title=\"Send this entry to a friend via email\">Email this<\/a>&nbsp;|&nbsp;<a href=\"http:\/\/www.engadget.com\/2010\/01\/15\/3g-gsm-encryption-cracked-in-less-than-two-hours\/#comments\" title=\"View reader comments on this entry\">Comments<\/a> <\/p>\n<p>Buy This Item: <a class=\"buy\" href=\"http:\/\/www.stoth.com\/buy.php\" ><span style=\"color: #33bc03\">[Click here to buy this item]<\/span><\/a><\/p>\n<p><a href=\"http:\/\/www.engadget.com\/2010\/01\/15\/3g-gsm-encryption-cracked-in-less-than-two-hours\/\" >Article<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Looks like all that GSM code-cracking is progressing faster than we thought. Soon after the discovery of the 64-bit A5\/1 GSM encryption flaw last month, the geniuses at Israel&#8217;s Weizmann Institute of Science went ahead and cracked the KASUMI system &#8212; a 128-bit A5\/3 algorithm implemented across 3G networks &#8212; in less than two hours. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-183109","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/183109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=183109"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/183109\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=183109"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=183109"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=183109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}