Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Subsequently the reply : (woo I'm a journalist!)

Dear Sir

Please find below my full reply to the journalist's enquiry.

Regards, Claire Cranton. ~~~~~~~~~~~~~~~~~~~~~~~~

We have been asked about this a number of times and the industry position is below. A5/1 has been in existence for a long time and so we have developed A5/3 as a migratory strategy for operators. However what I'd like to stress is that this activity is highly illegal and in the UK would be a serious RIPA offence as it probably is in most countries, it is likely also to contravene IPR. The GSMA heads up a security working group which looks at all issues re security and this isn't something that we take lightly at all.

Best wishes Claire

STATEMENT ON GSM ENCRYPTION GSM networks use encryption technology to make it difficult for criminals to intercept and eavesdrop on calls. On most GSM networks, the communications link between the handset and the radio base station uses the A5/1 privacy algorithm to scramble the signal.

Over the past few years, a number of academic papers setting out, in theory, how the A5/1 algorithm could be compromised have been published. However, none to date have led to a practical attack capability being developed against A5/1 that can be used on live, commercial GSM networks.

Reports of an imminent GSM eavesdropping capability are common. The GSMA, which welcomes research designed to improve the security of communications networks, routinely monitors the work of groups in this area. In 2007-8, a hacking group claimed to be building an attack on A5/1 by constructing a large look-up table1 of approximately 2 Terabytes - this is equivalent to the amount of data contained in a 20 kilometre high pile of books. In theory, someone with access to the data in such a table could use it to analyse an encrypted call and recover the encryption key.

Another group has announced similar plans in 2009. However, before a practical attack could be attempted, the GSM call has to be identified and recorded from the radio interface. So far, this aspect of the methodology has not been explained in any detail and we strongly suspect that the teams attempting to develop an intercept capability have underestimated its practical complexity. A hacker would need a radio receiver system and the signal processing software necessary to process the raw radio data. The complex knowledge required to develop such software is subject to intellectual property rights, making it difficult to turn into a commercial product.

Today, mobile networks are typically configured to optimise call set-up times, capacity and other aspects related to operational efficiency. But mobile operators could, if it ever proved necessary, quickly alter these configurations to make the 1 A definition of a lookup table is available at http://en.wikipedia.org/wiki/Lookup_table interception and deciphering of calls considerably harder. Moreover, intercepting a mobile call is likely to constitute a criminal offence in most jurisdictions.

All in all, we consider this research, which appears to be motivated in part by commercial considerations, to be a long way from being a practical attack on GSM. More broadly, A5/1 has proven to be a very effective and resilient privacy mechanism. By comparison, inexpensive and readily available radio scanners could be used to intercept calls on the analogue cellular networks that pre-dated GSM and which did not use encryption.

The mobile industry is committed to maintaining the integrity of GSM services and the protection and privacy of customer communications is at the forefront of operators' concerns. The GSMA has been working to further enhance privacy protection on GSM networks and has developed a new high-strength algorithm, A5/3. Over the past decade, export control agencies have removed many of the traditional barriers to the sale of cryptographic technologies enabling the development and use of A5/3. This new privacy algorithm is being phased in to replace A5/1. - Show quoted text - The GSMA represents the interests of the worldwide mobile communications industry. Spanning 219 countries, the GSMA unites nearly 800 of the world's mobile operators, as well as more than 200 companies in the broader mobile ecosystem. Visit www.gsmworld.com and www.mobileworldlive.com for more information.

It also produces the premier industry events including Mobile World Congress in Barcelona www.mobileworldcongress.com and Mobile Asia Congress www.mobileasiacongress.com



a large look-up table1 of approximately 2 Terabytes - this is equivalent to the amount of data contained in a 20 kilometre high pile of books

I don't understand. Can someone please translate to libraries of congress?


I agree... it's a ridiculous description, and obviously the point is to confuse a less technical person into thinking 2 TB requires more than a single top-of-the-line HDD to store.


Taking your request literally, 2 terabytes is equivalent to (roughly) one-37th of the currently-digitized items in the printed collection in the Library of Congress. Good day. :)

( citation: http://blogs.loc.gov/loc/2009/02/how-big-is-the-library-of-c... -- an interesting read on its own, as estimates of "libraries of congress" seem to wildly differ.)


> The complex knowledge required to develop such software is subject to intellectual property rights, making it difficult to turn into a commercial product.

Intellectual property rights aren't a security mechanism.

If the people in power at GSM are this clueless about security, I don't think they will ever be capable of producing anything usably secure.


Dear Ms. Cranton,

Are you seriously suggesting that criminals won't intercept calls in order to blackmail and insider trade because call interception is illegal ?

I don't remember anyone going to prison for these :

http://en.wikipedia.org/wiki/Squidgygate

http://en.wikipedia.org/wiki/News_of_the_World#2006_Phone_Ta...

http://news.sky.com/skynews/Home/Sky-News-Archive/Article/20...

Did you know that if you took the five pound notes it cost to buy 2tb of disk drive and laid them out end to end it would go from here to the end of my desk and back. Your book comparison is hilarious.

Who on earth is suggesting that anyone is going to make this into a commercial product?

I'm not sure whether you are naive or you think I am.

You should be giving FULL DISCLOSURE to your users, not platitudes. It really is shameful that you are just trying to cover your arses.

Yours sincerely,


1. Wait for hackers to break protocol. 2. Release new one the has no technical difference but change one number on the name. 3. ??? 4. Profit!


replace A5/1. - Show quoted text - The GSMA

Aah, is someone a gmail user?




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: