Paper 2012/208
A NEW GUESS-AND-DETERMINE ATTACK ON THE A5/1 STREAM CIPHER
Jay Shah and Ayan Mahalanobis
Abstract
In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with an average time complexity of $2^(48.5)$, which is much less than the brute-force attack with a complexity of $2^(64)$ . The attack has a $100\%$ success rate and requires about 5.65GB storage. We provide a detailed description of our new attack along with its implementation and results.
Note: Some minor changes to the previously submitted paper. Also, a new table is added to the previous draft which has a comparison of all the previous known attacks with our new proposed attack.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- A51GSMguess-and-determine attackstream ciphers
- Contact author(s)
- jayshah_89 @ hotmail com
- History
- 2012-05-03: revised
- 2012-04-22: received
- See all versions
- Short URL
- https://ia.cr/2012/208
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2012/208, author = {Jay Shah and Ayan Mahalanobis}, title = {A {NEW} {GUESS}-{AND}-{DETERMINE} {ATTACK} {ON} {THE} A5/1 {STREAM} {CIPHER}}, howpublished = {Cryptology {ePrint} Archive, Paper 2012/208}, year = {2012}, url = {https://eprint.iacr.org/2012/208} }