Title : 
Another attack on A5/1
         
        
            Author : 
Ekdahl, Patrik ; Johansson, Thomas
         
        
            Author_Institution : 
Dept. of Inf. Technol., Lund Univ., Sweden
         
        
        
        
        
            fDate : 
1/1/2003 12:00:00 AM
         
        
        
        
            Abstract : 
A5/1 is a stream cipher used in the Global System for Mobile Communications (GSM) standard. Several time-memory tradeoff attacks against A5/1 have been proposed, most notably the attack by Biryukov, Shamir and Wagner (1978), which can break A5/1 in seconds using huge precomputation time and memory. This article presents a completely different attack on A5/1, based on ideas from correlation attacks. Whereas time-memory tradeoff attacks have a complexity which is exponential with the shift-register length, the complexity of the proposed attack is almost independent of the shift-register length. Our implementation of the suggested attack breaks A5/1 in a few minutes using 2-5 min of conversation plaintext.
         
        
            Keywords : 
cellular radio; correlation methods; cryptography; telecommunication standards; A5/1 stream cipher; GSM standard; Global System for Mobile Communications; conversation plaintext; correlation attacks; cryptanalysis; encryption algorithm; exponential complexity; precomputation time; shift-register length; simulations; time-memory tradeoff attacks; Clocks; Communication standards; Cryptography; Data communication; GSM; Information technology; Information theory; Linear feedback shift registers; Privacy; Shift registers;
         
        
        
            Journal_Title : 
Information Theory, IEEE Transactions on
         
        
        
        
        
            DOI : 
10.1109/TIT.2002.806129