Author:
Bulavintsev Vadim,Semenov Alexander,Zaikin Oleg,Kochemazov Stepan
Abstract
Abstract
The A5/1 keystream generator is a part of Global System for Mobile Communications (GSM) protocol, employed in cellular networks all over the world. Its cryptographic resistance was extensively analyzed in dozens of papers. However, almost all corresponding methods either employ a specific hardware or require an extensive preprocessing stage and significant amounts of memory. In the present study, a bitslice variant of Anderson’s Attack on A5/1 is implemented. It requires very little computer memory and no preprocessing. Moreover, the attack can be made even more efficient by harnessing the computing power of modern Graphics Processing Units (GPUs). As a result, using commonly available GPUs this method can quite efficiently recover the secret key using only 64 bits of keystream. To test the performance of the implementation, a volunteer computing project was launched. 10 instances of A5/1 cryptanalysis have been successfully solved in this project in a single week.
Subject
Electrical and Electronic Engineering,Mechanical Engineering,Aerospace Engineering,General Materials Science,Civil and Structural Engineering,Environmental Engineering
Reference26 articles.
1. Concept of a multitask grid system with a flexible allocation of idle computational resources of supercomputers;Journal of Computer and Systems Sciences International,2017
2. Some computer organizations and their effectiveness;IEEE Trans. Comput.,1972
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献