Abstract
The Global Systems for Mobile communications (GSM) is the most widespread mobile communication technology existing nowadays. Despite being a mature technology, its introduction dates back to the late eighties, it suffers from several security vulnerabilities, which have been targeted by many attacks aimed to break the underlying communication protocol. Most of these attacks focuses on the A5/1 algorithm used to protect over-the-air communication between the two parties of a phone call. This algorithm has been superseded by new and more secure algorithms. However, it is still in use in the GSM networks as a fallback option, thus still putting at risk the security of the GSM based conversations. The objective of this work is to review some of the most relevant results in this field and discuss their practical feasibility. To this end, we consider not only the contributions coming from the canonical scientific literature but also those that have been proposed in a more informal context, such as during hacker conferences.
Chapter PDF
Similar content being viewed by others
References
3rd Generation Partnership Project (3GPP): Technical Specifications for GSM systems, http://www.3gpp.org/
Barkan, E., Biham, E., Keller, N.: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 600–616. Springer, Heidelberg (2003)
Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5/1 on a PC. Fast Software Encryption (2001)
Castiglione, A., Cattaneo, G., Maio, G., Petagna, F.: SECR3T: Secure End-to-End Communication over 3G Telecommunication Networks. In: IMIS 2011, pp. 520–526 (2011)
Castiglione, A., Cattaneo, G., Cembalo, M., De Santis, A., Faruolo, P., Petagna, F., Ferraro Petrillo, U.: Engineering a secure mobile messaging framework. Computers & Security 31(6), 771–781 (2012)
Castiglione, A., De Prisco, R., De Santis, A.: Do You Trust Your Phone? In: Di Noia, T., Buccafurri, F. (eds.) EC-Web 2009. LNCS, vol. 5692, pp. 50–61. Springer, Heidelberg (2009)
De Santis, A., Castiglione, A., Cattaneo, G., Cembalo, M., Petagna, F., Ferraro Petrillo, U.: An Extensible Framework for Efficient Secure SMS. IMIS 2010, pp. 843–850 (2010)
Ekdahl, P., Johansson, T.: Another attack on A5/1. Information Theory (2003)
Golić, J.D.: Cryptanalysis of Alleged A5 Stream Cipher. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 239–255. Springer, Heidelberg (1997)
GSMK: Cryptophone (2012), http://www.cryptophone.de/
Lee, G.W., Hong, J.: A comparison of perfect table cryptanalytic tradeoff algorithms. Cryptology ePrint Archive, Report 2012/540 (2012), http://eprint.iacr.org/
Matsui, M.: New Block Encryption Algorithm MISTY. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 54–68. Springer, Heidelberg (1997)
Nohl, K.: Subverting the security base of GSM. In: Hacking at Random (2009), https://har2009.org/program/events/187.en.html
Nohl, K.: Attacking phone privacy. In: BLACK HAT USA (2010), http://www.blackhat.com/html/bh-us-10/bh-us-10-archives.html
Nohl, K.: Wideband GSM sniffing. In: 27th Chaos Communication Congress (2010), http://events.ccc.de/congress/2010/Fahrplan/events/4208.en.html
Paget, C.: Practical Cellphone Spying. In: DEF CON 18 (2010), http://defcon.org/html/links/dc-archives/dc-18-archive.html
Paget, C., Nohl, K.: GSM: SRSLY? In: 26th Chaos Communication Congress (2009), http://events.ccc.de/congress/2009/Fahrplan/events/3654.en.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Cattaneo, G., De Maio, G., Faruolo, P., Petrillo, U.F. (2013). A Review of Security Attacks on the GSM Standard. In: Mustofa, K., Neuhold, E.J., Tjoa, A.M., Weippl, E., You, I. (eds) Information and Communication Technology. ICT-EurAsia 2013. Lecture Notes in Computer Science, vol 7804. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36818-9_58
Download citation
DOI: https://doi.org/10.1007/978-3-642-36818-9_58
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-36817-2
Online ISBN: 978-3-642-36818-9
eBook Packages: Computer ScienceComputer Science (R0)