dc.contributor.author | Tariq, Jahangir | |
dc.contributor.author | Hafeez, Alhan | |
dc.contributor.author | Ali, Qaisar | |
dc.contributor.author | Ahmad, Shumail | |
dc.contributor.author | supervised by Raja Iqbal, Dr Nazar Abbas | |
dc.date.accessioned | 2020-10-29T07:00:06Z | |
dc.date.available | 2020-10-29T07:00:06Z | |
dc.date.issued | 2009-08 | |
dc.identifier.other | PTE-163 | |
dc.identifier.uri | http://10.250.8.41:8080/xmlui/handle/123456789/7757 | |
dc.description.abstract | The stream cipher A5/2 is used in GSM (Global System for mobile Communication) for authentication and data encryption. There have been numerous successful attacks that were launched on A5/2 hence breaking down its security. For realizing the LSE solver component, we used Gauss-Jordan algorithm. Our attack immediately recovers the initial secret state of A5/2 which is sufficient for decrypting all frames of a session using a few cipher text frames. We directly attack the GSM speech channel. It requires 16 cipher text frames and completes the attack in about 1 second. With minor changes also input from other GSM channels can be used to mount the attack. | en_US |
dc.language.iso | en | en_US |
dc.publisher | MCS | en_US |
dc.title | GSM Interceptor | en_US |
dc.type | Technical Report | en_US |