Hi all.

Has anybody written code to decrypt A5/2 just like A5/1?

I have heard that A5/2 is also a weak implementation.

In 1999, Ian Goldberg and David A. Wagner cryptanalyzed A5/2 in the same
month it was published, and showed that it was extremely weak — so much so
that low end equipment can probably break it in real time.

Since July 1, 2006, the GSMA (GSM Association) mandated that GSM Mobile
Phones will not support the A5/2 Cipher any longer, due to its weakness, and
the fact that A5/1 is deemed mandatory by the 3GPP association. In July
2007, the 3GPP has approved a change request to prohibit the implementation
of A5/2 in any new mobile phones.[1]

Are there many telecom vendors still using A5/2 today in reality compared to
A5/1?

References

1. http://en.wikipedia.org/wiki/A5/2

Regards

Asad
_______________________________________________
A51 mailing list
[email protected]
http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51

Reply via email to