2013
DOI: 10.1145/2535522
|View full text |Cite
|
Sign up to set email alerts
|

An experimental security analysis of two satphone standards

Abstract: General purpose communication systems such as GSM and UMTS have been in the focus of security researchers for over a decade now. Recently also technologies that are only used under more specific circumstances have come into the spotlight of academic research and the hacker scene alike. A striking example of this is recent work [Driessen et al. 2012] that analyzed the security of the over-the-air encryption in the two existing ETSI satphone standards GMR-1 and GMR-2. The firmware of handheld devices was reverse… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(8 citation statements)
references
References 14 publications
0
8
0
Order By: Relevance
“…Firstly, we describe attacks in the existing public literature: a guess and determine attack presented as the preliminary cryptanalysis of the keystream [3], and an improved version in [4] that uses keystreams from multiple frames. Then we discuss the application of a generic time-memory attack to the cipher.…”
Section: Attacking A5-gmr1mentioning
confidence: 99%
See 2 more Smart Citations
“…Firstly, we describe attacks in the existing public literature: a guess and determine attack presented as the preliminary cryptanalysis of the keystream [3], and an improved version in [4] that uses keystreams from multiple frames. Then we discuss the application of a generic time-memory attack to the cipher.…”
Section: Attacking A5-gmr1mentioning
confidence: 99%
“…Initialisation using K and E must be performed before a keystream segment of the required length can be generated and used for encryption or decryption of the frame. An outline of the initialisation process is provided in [3] with additional detail given in [4]. A good initialisation process should ensure that each (K,E) pair generates a distinct and unpredictable keystream sequence, and that multiple sequences produced with the same key but different frame numbers appear unrelated.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…The Authentication process lies before the ciphering process, and it is a most important process in the GSM security, because it is ensured that the ciphering scheme achieved for the right party. There are many works took GSM security, some of them are only analytic study, and some of these studies are improvements of GSM security, and in the following section the most important related works are posted [4] and described the attacks over the IP networks and their suggested solutions to counter measures for the attacks in 2.5G and 3G Cellular IP Networks. Forsgren et al [5] Proposed Security and Trust of Public Key Cryptography Options for Host Identity Protocol to give verified identities to host using public key certificates and certificate-less public key cryptography (CL-PKC).…”
Section: Related Workmentioning
confidence: 99%
“…* The inverse of a point (x, y) is (x, −y), where −y is the additive inverse of y. For example, if we have a curve y 2 = x 3 − 4x, and p = 13, the inverse of (4, 2)is (4,11). Because 2+11 mod 13 = 0 * ECDLP: is a "hard" problem, equivalent to solving the discrete logarithm: • Q = k P, where Q, P belong to a prime curve.…”
Section: Ecc Propertiesmentioning
confidence: 99%