Vulnerabilities / Threats
12/29/2009
02:23 PM
Connect Directly
RSS
E-Mail
50%
50%

Hacker Breaks GSM Mobile Phone Code

A German computer scientist has cracked the encryption algorithm that secures 80% of the world's mobile phones, but it's far from a practical attack.

A German computer scientist working with a team of experts has broken the code used to secure about 80% of the world's mobile phones. But the group responsible for protecting GSM communications said Tuesday the feat is a "long way from being a practical attack."

Researcher Karsten Nohl, a former graduate student at the University of Virginia, revealed his decryption methods this week at the Chaos Communication Conference in Berlin, the largest hackers conference in Europe. Nohl and a team of two dozen other experts worked for five months to crack the security algorithm that protects Global System for Mobile communications.

GSM is the world's most widely used phone technology, accounting for more than 4 billion mobile phones. To prevent eavesdropping, the technology uses an encryption algorithm called A5/1 developed by the GSM Association.

To break the code, Nohl and the other researchers used networks of computers to crunch through the trillions of mathematical possibilities. The result was the development of a code book comprising 2 TB of data that's compiled into cracking tables. The tables can be used as a kind of reverse phone book to determine the encryption key used to secure a GSM mobile phone conversation or text message.

Before the latest hack, hundreds of thousands of dollars of computer equipment was needed to break the GSM code, mostly limiting hacking to government agencies. Nohl told the conference that someone with the code book could eavesdrop on GSM communications using about $30,000 worth of computer gear, making such illegal activity possible by many more criminal organizations.

On Tuesday, a GSMA statement sent to InformtationWeek by e-mail said Nohl's work "isn't something that we take lightly at all." Nevertheless, the organization said, the hack did not present an immediate danger to GSM security.

"All in all, we consider this research, which appears to be motivated in part by commercial considerations, to be a long way from being a practical attack on GSM," the organization said.

The GSMA said in a statement that over the last few years, a number of academic papers have explained, in theory, how the A5/1 algorithm, which is more than 20 years old, could be compromised. "However, none to date have led to a practical attack capability being developed against A5/1 that can be used on live, commercial GSM networks," the group said.

One area not covered by Nohl's work, according to the GSMA, is how the GSM call would be identified and recorded from the radio interface. To do that, a hacker would need a radio receiver system and the signal processing software necessary to process the raw radio data.

"So far, this aspect of the methodology has not been explained in any detail and we strongly suspect that the teams attempting to develop an intercept capability have underestimated its practical complexity," the GSMA said.

Nevertheless, the group recognizes that A5/1 needs to be replaced, and is in the process of phasing in a new security algorithm called A5/3

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0607
Published: 2014-07-24
Unrestricted file upload vulnerability in Attachmate Verastream Process Designer (VPD) before R6 SP1 Hotfix 1 allows remote attackers to execute arbitrary code by uploading and launching an executable file.

CVE-2014-1419
Published: 2014-07-24
Race condition in the power policy functions in policy-funcs in acpi-support before 0.142 allows local users to gain privileges via unspecified vectors.

CVE-2014-2360
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules allow remote attackers to execute arbitrary code via packets that report a high battery voltage.

CVE-2014-2361
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules, when BreeZ is used, do not require authentication for reading the site security key, which allows physically proximate attackers to spoof communication by obtaining this key after use of direct hardware access or manual-setup mode.

CVE-2014-2362
Published: 2014-07-24
OleumTech WIO DH2 Wireless Gateway and Sensor Wireless I/O Modules rely exclusively on a time value for entropy in key generation, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by predicting the time of project creation.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Sara Peters hosts a conversation on Botnets and those who fight them.