----- Original Message ----- From: "Greg Rose" <[EMAIL PROTECTED]> To: "Anton Stiglic" <[EMAIL PROTECTED]> Cc: "John Doe Number Two" <[EMAIL PROTECTED]>; <[EMAIL PROTECTED]> Sent: Monday, September 08, 2003 1:39 PM Subject: Re: Code breakers crack GSM cellphone encryption
> At 11:43 AM 9/8/2003 -0400, Anton Stiglic wrote: > >I think this is different however. The recent attack focused on the A5/3 > >encryption algorithm, while the work of Lucky, Briceno, Goldberg, Wagner, > >Biryukov, Shamir (and others?) was on A5/1 and A5/2 (and other crypto > >algorithms of GSM, such as COMP128, ...). > > No, that's not right. The attack *avoids* A5/3, by making the terminal end > of the call fall back to A5/2, solving for the key in real time, then > continuing to use the same key with A5/3. That`s what I meant to say but did not use the right words to say. The attack does however seem novel. I haven`t seen the paper on the web yet (all I know is that it was presented at Crypto 03 which I did not attend), I`m anxious to get my hands on it. --Anton --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]
