Paper 2012/208

A NEW GUESS-AND-DETERMINE ATTACK ON THE A5/1 STREAM CIPHER

Jay Shah and Ayan Mahalanobis

Abstract

In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with an average time complexity of $2^(48.5)$, which is much less than the brute-force attack with a complexity of $2^(64)$ . The attack has a $100\%$ success rate and requires about 5.65GB storage. We provide a detailed description of our new attack along with its implementation and results.

Note: Some minor changes to the previously submitted paper. Also, a new table is added to the previous draft which has a comparison of all the previous known attacks with our new proposed attack.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
A51GSMguess-and-determine attackstream ciphers
Contact author(s)
jayshah_89 @ hotmail com
History
2012-05-03: revised
2012-04-22: received
See all versions
Short URL
https://ia.cr/2012/208
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2012/208,
      author = {Jay Shah and Ayan Mahalanobis},
      title = {A {NEW} {GUESS}-{AND}-{DETERMINE} {ATTACK} {ON} {THE} A5/1 {STREAM} {CIPHER}},
      howpublished = {Cryptology {ePrint} Archive, Paper 2012/208},
      year = {2012},
      url = {https://eprint.iacr.org/2012/208}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.