Vulnerabilities / Threats
12/29/2009
02:23 PM
Connect Directly
RSS
E-Mail
50%
50%

Hacker Breaks GSM Mobile Phone Code

A German computer scientist has cracked the encryption algorithm that secures 80% of the world's mobile phones, but it's far from a practical attack.

A German computer scientist working with a team of experts has broken the code used to secure about 80% of the world's mobile phones. But the group responsible for protecting GSM communications said Tuesday the feat is a "long way from being a practical attack."

Researcher Karsten Nohl, a former graduate student at the University of Virginia, revealed his decryption methods this week at the Chaos Communication Conference in Berlin, the largest hackers conference in Europe. Nohl and a team of two dozen other experts worked for five months to crack the security algorithm that protects Global System for Mobile communications.

GSM is the world's most widely used phone technology, accounting for more than 4 billion mobile phones. To prevent eavesdropping, the technology uses an encryption algorithm called A5/1 developed by the GSM Association.

To break the code, Nohl and the other researchers used networks of computers to crunch through the trillions of mathematical possibilities. The result was the development of a code book comprising 2 TB of data that's compiled into cracking tables. The tables can be used as a kind of reverse phone book to determine the encryption key used to secure a GSM mobile phone conversation or text message.

Before the latest hack, hundreds of thousands of dollars of computer equipment was needed to break the GSM code, mostly limiting hacking to government agencies. Nohl told the conference that someone with the code book could eavesdrop on GSM communications using about $30,000 worth of computer gear, making such illegal activity possible by many more criminal organizations.

On Tuesday, a GSMA statement sent to InformtationWeek by e-mail said Nohl's work "isn't something that we take lightly at all." Nevertheless, the organization said, the hack did not present an immediate danger to GSM security.

"All in all, we consider this research, which appears to be motivated in part by commercial considerations, to be a long way from being a practical attack on GSM," the organization said.

The GSMA said in a statement that over the last few years, a number of academic papers have explained, in theory, how the A5/1 algorithm, which is more than 20 years old, could be compromised. "However, none to date have led to a practical attack capability being developed against A5/1 that can be used on live, commercial GSM networks," the group said.

One area not covered by Nohl's work, according to the GSMA, is how the GSM call would be identified and recorded from the radio interface. To do that, a hacker would need a radio receiver system and the signal processing software necessary to process the raw radio data.

"So far, this aspect of the methodology has not been explained in any detail and we strongly suspect that the teams attempting to develop an intercept capability have underestimated its practical complexity," the GSMA said.

Nevertheless, the group recognizes that A5/1 needs to be replaced, and is in the process of phasing in a new security algorithm called A5/3

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6117
Published: 2014-07-11
Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.

CVE-2014-0174
Published: 2014-07-11
Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie.

CVE-2014-3485
Published: 2014-07-11
The REST API in the ovirt-engine in oVirt, as used in Red Hat Enterprise Virtualization (rhevm) 3.4, allows remote authenticated users to read arbitrary files and have other unspecified impact via unknown vectors, related to an XML External Entity (XXE) issue.

CVE-2014-3499
Published: 2014-07-11
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.

CVE-2014-3503
Published: 2014-07-11
Apache Syncope 1.1.x before 1.1.8 uses weak random values to generate passwords, which makes it easier for remote attackers to guess the password via a brute force attack.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Marilyn Cohodas and her guests look at the evolving nature of the relationship between CIO and CSO.