A New Guess-and-Determine Method for Cryptanalysis of the GSM Encryption

نویسندگان

چکیده

Cryptanalysis is the process of finding flaws or oversights in an encryption algorithm. Nearly, all algorithms are carefully examined through cryptanalysis to determine security system which algorithm has been employed. A5/1 a well-known inbuilt mobile phone for securing GSM communication, and therefore, this also important. consists three linear feedback registers lengths 23, 22, 19 bits. Due nonlinear clocking mechanism A5/1, cryptanalytic attacks guess-and-determine (GD) nature efficient more successful. In paper, we propose new low keystream GD attack on A5/1. The basic idea guessing some portion determining remaining via relationship between register’s state known intercepted keystream. guessed determined validated by running cipher forward from that state. If matches generated keystream, accept it. Otherwise, discard try again. computational complexity success rate proposed O 2 52 96.6%, respectively.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of GSM encryption algorithm A5/1

The A5/1 algorithm is one of the most famous stream cipher algorithms used for over-the-air communication privacy in GSM. The purpose of this paper is to analyze several weaknesses of A5/1, including an improvement to an attack and investigation of the A5/1 state transition. Biham and Dunkelman proposed an attack on A5/1 with a time and data complexity of 239.91and 221.1, ...

متن کامل

On the computational complexity of finding a minimal basis for the guess and determine attack

Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...

متن کامل

A New Guess-and-Determine Attack on the A5/1

In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this paper, we present a new attack on the A5/1 stream cipher with a minimum time complexity of around 2 and an average complexity of 2, which is much less than the brute-force attack with a complexity of 2. The attack has a 100% success rat...

متن کامل

Cryptanalysis of a Chaotic Image Encryption Method

The security of digital images attracts much attention recently, and many image encryption methods have been proposed. In ISCAS2000, a new chaotic key-based algorithm (CKBA) for image encryption was proposed. This paper points out CKBA is very weak to the chosen/known-plaintext attack with only one plainimage, and its security to brute-force ciphertext-only attack is overestimated by the author...

متن کامل

A New Method for Encryption of Color Images based on Combination of Chaotic Systems

This paper presents a new method for encryption of color images based on a combination of chaotic systems, which makes the image encryption more efficient and robust. The proposed algorithm generated three series of data, ranged between 0 and 255, using a chaotic Chen system. Another Chen system was then started with different initial values, which were converted to three series of numbers from...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Complexity

سال: 2023

ISSN: ['1099-0526', '1076-2787']

DOI: https://doi.org/10.1155/2023/7249127