2005
DOI: 10.1007/11427186_36
|View full text |Cite
|
Sign up to set email alerts
|

Synchronization Fault Cryptanalysis for Breaking A5/1

Abstract: Abstract. A5/1 pseudo-random bit generator, known from GSM networks, potentially might be used for different purposes, such as secret hiding during cryptographic hardware testing, stream encryption in piconets and others. The main advantages of A5/1 are low cost and a fixed output ratio. We show that a hardware implementation of A5/1 and similar constructions must be quite careful. It faces a danger of a new kind of attack, which significantly reduces possible keyspace, allowing full recovery of A5/1 internal … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2005
2005
2009
2009

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Then the Section 2 describes our first attack, based on synchronization fault assumption (the assumption is similar to those from [9]). The Section 3 presents another attack, based on weaker assumptions.…”
Section: Introductionmentioning
confidence: 99%
“…Then the Section 2 describes our first attack, based on synchronization fault assumption (the assumption is similar to those from [9]). The Section 3 presents another attack, based on weaker assumptions.…”
Section: Introductionmentioning
confidence: 99%
“…While the actual attack might face some practical issues [7], it can be used as a trapdoor in the cipher. This paper hopes to provide more design awareness for side channel attacks.…”
Section: Resultsmentioning
confidence: 99%
“…Together with the correct output, the faulty output yield important information about the initial state. In [7], the authors discovered that by stopping one of the LFSR of A5/1, attackers can easily compromise the device. Also in [11], the authors generalize the (Phase Shift) Attack and gave an example on the Shrinking Generator.…”
Section: Timing Analysis On Absgmentioning
confidence: 99%