The current encryption algorithm for voice calls made over GSM networks has been cracked by a team of 24 hackers led by encryption specialist Karsten Nohl during the Chaos Communication Congress being held this week in Berlin.
The A5/1 algorithm is a 21 year old 64-bit algorithm used in the encryption of voice calls originating over GSM networks, with Nohl turning the raw binary output into a 2 terabyte “code book” that would allow for the decoding of a valid encryption key.
For its part, the GSM Association is not pleased with the recent development, claiming that cracking the algorithm is illegal in the US and Great Britain, where the trade group is based and has begun its own saber rattling and PR triage with assurances that the disclosure of an encryption key does not mean that calls are unprotected, further stating that carriers can modify the current algorithm to increase security.
The GSM Association has a newer, more robust encryption algorithm available in A5/3 for GSM networks with plans in place to transition away from A5/1 as carriers seek to increase network security.
[…] Permalink Phone News | New York Times | Email this | Comments Loading… @import url("http://www.google.com/uds/css/gsearch.css"); window._uds_vbw_donotrepair = true; @import url("http://www.google.com/uds/solutions/videobar/gsvideobar.css"); .playerInnerBox_gsvb .player_gsvb { width : 320px; height : 260px; } function LoadVideoBar() { var videoBar; var options = { largeResultSet : !true, horizontal : true, autoExecuteList : { cycleTime : GSvideoBar.CYCLE_TIME_MEDIUM, cycleMode : GSvideoBar.CYCLE_MODE_LINEAR, executeList : ["ytchannel:theworacle","ytchannel:luckymauro","ytchannel:mttdx"] } } videoBar = new GSvideoBar(document.getElementById("videoBar-bar"), GSvideoBar.PLAYER_ROOT_FLOATING, options); } // arrange for this function to be called during body.onload // event processing GSearch.setOnLoadCallback(LoadVideoBar); Filed under: Engadget No Comments Comments (0) Trackbacks (0) ( subscribe to comments on this post ) […]
[…] Permalink Phone News | New York Times | Email this | Comments Go to Source […]
[…] Permalink Phone News | New York Times | Email this | Comments Filed under Engadget Tags: Bit, code, computer engineer, Engadget, GSM, gsm connections, Karsten, Mr. Nohl, nbsp, private conversations, random strings, Tiger ← Palm Pre plays Need for Speed, undercover (video) i-SOBOT goes haywire with stash of weapons, instills fear in mere mortals → […]
[…] Permalink Phone News | New York Times | Email this | Comments Leave a comment […]
[…] Permalink Phone News | New York Times | Email this | Comments […]
[…] Permalink Phone News | New York Times | Email this | Comments Categories: Technology Tags: Comments (0) Leave a comment […]
[…] specialist Karsten Nohl has taken the raw binary data and turned it into a 2TB codebook that allows for decoding of the valid encryption […]
[…] [Via Phone News] […]
[…] Phone News Share: […]
[…] Permalink Phone News | New York Times | Email this | Comments […]
[…] specialist Karsten Nohl has taken the raw binary data and turned it into a 2TB codebook that allows for decoding of the valid encryption […]
[…] Permalink Phone News | New York Times | Email this | Comments ArrayArrayArrayArrayArrayArray Link To This Post1. Click inside the codebox2. Right-Click then Copy3. Paste the HTML code into your webpage codebox<a href="http://www.touchtotech.com/gsm-call-encryption-code-cracked-published-for-the-whole-world-to-see/2009/12/29/">GSM call encryption code cracked, published for the whole world to see</a> Related PostsNo Related Post […]
Isn’t cracking an algorithm always kind of illegal ?