2018
DOI: 10.1515/eng-2018-0002
|View full text |Cite
|
Sign up to set email alerts
|

A Bitslice Implementation of Anderson’s Attack on A5/1

Abstract: Abstract:The A5/1 keystream generator is a part of Global System for Mobile Communications (GSM) protocol, employed in cellular networks all over the world. Its cryptographic resistance was extensively analyzed in dozens of papers. However, almost all corresponding methods either employ a specific hardware or require an extensive preprocessing stage and significant amounts of memory. In the present study, a bitslice variant of Anderson's Attack on A5/1 is implemented. It requires very little computer memory an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
2
0
1

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 17 publications
(24 reference statements)
0
2
0
1
Order By: Relevance
“…This attack can be mounted in reasonable time if one uses specialized computing architectures allowing massive parallelism, such as FPGA or GPU. The corresponding results were presented in [43] and [66] for FPGA, and in [67] for GPU. One can view the Anderson's attack as an attack in which one has to solve simple systems of linear equations over GF (2).…”
Section: Related Workmentioning
confidence: 99%
“…This attack can be mounted in reasonable time if one uses specialized computing architectures allowing massive parallelism, such as FPGA or GPU. The corresponding results were presented in [43] and [66] for FPGA, and in [67] for GPU. One can view the Anderson's attack as an attack in which one has to solve simple systems of linear equations over GF (2).…”
Section: Related Workmentioning
confidence: 99%
“…The internal architecture of the two algorithms (i.e, A 3 and A 8 ) in GSM is not described. The operators may additionally adopt the exact configuration of the stream cipher algorithms [2] on their personal. In 1994 the approximate design of A5/1 was disclosed [20].…”
Section: Introductionmentioning
confidence: 99%
“…Several cryptanalytic techniques were proposed on the A5/1 cipher include Anderson [2], Golic [19] and Babbage [11]. In 2001 Biryukov, Shamir, and Wagner [12], in 2000 Biham and Manuscript received June 4, 2021; revised December 16, 2021.…”
Section: Introductionmentioning
confidence: 99%
“…Алгоритм A в этом случае простейший фактически, подстановка значений переменных из B в систему уравнений, описывающую генерацию ключевого потока; результирующая система становится тривиально разрешимой. В дальнейшем атака Андерсона была реализована как с применением специально спроектированной для этой цели ПЛИС-архитектуры [6], так и в распределённой среде, использующей общедоступные GPU [7]. Известно довольно много примеров атак типа угадывай и определяй , в которых алгоритм A это алгоритм решения систем линейных алгебраических уравнений (СЛАУ).…”
unclassified