Attributes | Values |
---|
rdf:type
| |
Description
| - GSM is the most widely used system for mobile phone communication. GSM was developed in 1980s for the use in Europe. The GSM standard defines algorithms for authentication as well as for data encryption. The encryption algorithms are denoted as A5/1 and A5/2. The original cipher, A5/1, is used within Europe and in most other countries, while weaker A5/2 cipher has been developed later --- due to the export restriction --- for deploying GSM outside Europe. We present two known-plaintext attacks against stronger cipher A5/1 that we developed and fully implemented. They represent the first real-world implementations of attacks against A5/1 reported in open literature. To implement both attacks, we used a special-purpose hardware, COPACOBANA, however, the attacks are different.
- GSM is the most widely used system for mobile phone communication. GSM was developed in 1980s for the use in Europe. The GSM standard defines algorithms for authentication as well as for data encryption. The encryption algorithms are denoted as A5/1 and A5/2. The original cipher, A5/1, is used within Europe and in most other countries, while weaker A5/2 cipher has been developed later --- due to the export restriction --- for deploying GSM outside Europe. We present two known-plaintext attacks against stronger cipher A5/1 that we developed and fully implemented. They represent the first real-world implementations of attacks against A5/1 reported in open literature. To implement both attacks, we used a special-purpose hardware, COPACOBANA, however, the attacks are different. (en)
|
Title
| - COPACOBANA-Assisted Cryptanalysis of GSM Communication
- COPACOBANA-Assisted Cryptanalysis of GSM Communication (en)
|
skos:prefLabel
| - COPACOBANA-Assisted Cryptanalysis of GSM Communication
- COPACOBANA-Assisted Cryptanalysis of GSM Communication (en)
|
skos:notation
| - RIV/68407700:21240/09:00159974!RIV10-MSM-21240___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/68407700:21240/09:00159974
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - Cryptanalysis; GSM Communication; A5/1; cipher; COPACOBANA (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...v/mistoKonaniAkce
| |
http://linked.open...i/riv/mistoVydani
| |
http://linked.open...i/riv/nazevZdroje
| - Fifth Doctoral Workshop on Mathematical and Engineering Methods in Computer Science
|
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| |
http://linked.open...vavai/riv/typAkce
| |
http://linked.open.../riv/zahajeniAkce
| |
http://linked.open...n/vavai/riv/zamer
| |
number of pages
| |
http://purl.org/ne...btex#hasPublisher
| |
https://schema.org/isbn
| |
http://localhost/t...ganizacniJednotka
| |
is http://linked.open...avai/riv/vysledek
of | |