Re: [A51] New A5/1 attack patented
On Dec 27, 2012, at 5:00 , javier falbo wrote: > Yes, from what i could read, we could use it to prevent the frequency hopping > efect (or decode the stream and also change the frequency remote) and track > the conversation even after hoping. > > A5/2 trick is old, that by forcing a 3G phone to move to GSM. > Solution: Put on your phone do not authorize DUAL MODE, just fix it on 3G. > > I think what the article try to focus is on this "new" man in the middle > attach, that with a normal PC you could take the key in 1 second. > Which is maybe similar as the IMSI catchers or creating a fake cell. > > Nowadays i am working to implement this on any android device with a special > python script and custom rom :) > Android is open source. > > Regards. > > > Date: Thu, 27 Dec 2012 04:43:32 +0100 > > From: 246...@gmail.com > > To: m.bev...@gmail.com > > CC: a51@lists.reflextor.com > > Subject: Re: [A51] New A5/1 attack patented > > > > > Elad Barkan and Eli Biham (them again) filed a patent which was made > > > public 2 months ago. It appears to be a new attack against A5/1: > > > > > > http://www.google.com/patents/US8295477 > > > > I've just did a quick scan through it and didn't really see what's > > "new" about it ... > > > > The abstract seems to describe the very well known A5/2 attack and > > it's optimization. They also describe in the invention the classic > > downgrade attacks (sinceit all A5/x share the same Kc, you attack A5/2 > > or A5/1 using an imsi catcher and reuse the found Kc to decrypt > > intercepted A5/3 data for eg). > > > > Can you pin point exactly what "new" about it ? > > > > AFAICT it's just the exact stuff they published 10 years ago ... I'm with Sylvain in wondering what is new (and patentable) here. Apart from the novelty question, the technical relevance seems to have dropped significantly over the past years: * No phone with A5/2 support (the weakest cipher) should have been produced in years. The GSMA requires new phones to not support it anymore * Cracking A5/1 (the somewhat better cipher) also takes only seconds on a good computer, allowing for the same kind of man-in-the-middle attack the patent describes, but against all GSM-capable phones * Networks steadily move to A5/3 (the best available cipher) making it possible -- in theory -- to prevent MITM attacks. However, this would require the phone to notice that a network temporarily downgrades to A5/1 (or even A5/2) and notify the user. Anybody here know whether the type of encryption used is exposed to Android? Cheers, -Karsten ___ A51 mailing list A51@lists.reflextor.com http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
Re: [A51] New A5/1 attack patented
Yes, from what i could read, we could use it to prevent the frequency hopping efect (or decode the stream and also change the frequency remote) and track the conversation even after hoping. A5/2 trick is old, that by forcing a 3G phone to move to GSM.Solution: Put on your phone do not authorize DUAL MODE, just fix it on 3G. I think what the article try to focus is on this "new" man in the middle attach, that with a normal PC you could take the key in 1 second.Which is maybe similar as the IMSI catchers or creating a fake cell. Nowadays i am working to implement this on any android device with a special python script and custom rom :)Android is open source. Regards. > Date: Thu, 27 Dec 2012 04:43:32 +0100 > From: 246...@gmail.com > To: m.bev...@gmail.com > CC: a51@lists.reflextor.com > Subject: Re: [A51] New A5/1 attack patented > > > Elad Barkan and Eli Biham (them again) filed a patent which was made > > public 2 months ago. It appears to be a new attack against A5/1: > > > > http://www.google.com/patents/US8295477 > > I've just did a quick scan through it and didn't really see what's > "new" about it ... > > The abstract seems to describe the very well known A5/2 attack and > it's optimization. They also describe in the invention the classic > downgrade attacks (sinceit all A5/x share the same Kc, you attack A5/2 > or A5/1 using an imsi catcher and reuse the found Kc to decrypt > intercepted A5/3 data for eg). > > Can you pin point exactly what "new" about it ? > > AFAICT it's just the exact stuff they published 10 years ago ... > > Cheers, > > Sylvain > ___ > A51 mailing list > A51@lists.reflextor.com > http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51 ___ A51 mailing list A51@lists.reflextor.com http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
Re: [A51] New A5/1 attack patented
> Elad Barkan and Eli Biham (them again) filed a patent which was made > public 2 months ago. It appears to be a new attack against A5/1: > > http://www.google.com/patents/US8295477 I've just did a quick scan through it and didn't really see what's "new" about it ... The abstract seems to describe the very well known A5/2 attack and it's optimization. They also describe in the invention the classic downgrade attacks (sinceit all A5/x share the same Kc, you attack A5/2 or A5/1 using an imsi catcher and reuse the found Kc to decrypt intercepted A5/3 data for eg). Can you pin point exactly what "new" about it ? AFAICT it's just the exact stuff they published 10 years ago ... Cheers, Sylvain ___ A51 mailing list A51@lists.reflextor.com http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51
[A51] New A5/1 attack patented
Elad Barkan and Eli Biham (them again) filed a patent which was made public 2 months ago. It appears to be a new attack against A5/1: http://www.google.com/patents/US8295477 -mrb ___ A51 mailing list A51@lists.reflextor.com http://lists.lists.reflextor.com/cgi-bin/mailman/listinfo/a51