GSM (in)Security


GSM Security and Encryption. An overview by David Margrave

Ross Anderson, "Subject: A5" (posting to sci.crypt newsgroup,17 Jun 1994)

"A Cipher Claimed to Resemble A5" by W. G. Chambers (from "On Random Mappings and Random Permutations", FSE2, 1994)

Bruce Schneier, "A5 (from "Applied Cryptography")" (2nd. Edition, 1996)

Cryptanalysis of Alleged A5 Stream Cipher by Jovan Dj. Golic (EUROCRYPT '97)

Implementations of the GSM Security algorithms A3, A5, and A8,
reverse engineered by Marc Briceno, Ian Goldberg, and David Wagner (1998):

An implementation of the GSM A3-A8 algorithm

A pedagogical implementation of A5/1

A pedagogical implementation of the GSM A5/1 and A5/2 "voice privacy encryption algorithms"

GSM Cloning FAQ by David Wagner, and Wired News Report (April 1998)

 
Real Time Cryptanalysis of the Alleged A5/1 on a PC by Alex Biryukov and Adi Shamir (Dec 1999)

European Cellular Encryption Algorithms by Bruce Schneier ("Crypto-Gram", 15 Dec 1999)


GSM Overall Overviews

Overview of the Global System for Mobile Communications by John Scourias (1997)

An overview of the GSM system by Javier Gozalvez Sempere (1998)


[ home ]