Cryptanalysis of the A5/2 Algorithm

  title={Cryptanalysis of the A5/2 Algorithm},
  author={Slobodan Petrovic and Amparo F{\'u}ster-Sabater},
  journal={IACR Cryptology ePrint Archive},
An attack on the A5/2 stream cipher algorithm is described, that determines the linear relations among the output sequence bits. The vast majority of the unknown output bits can be reconstructed. The time complexity of the attack is proportional to 2. Introduction: A5 is the stream cipher algorithm used to encrypt the link from the telephone to the base station in the GSM system. According to [1], two versions of A5 exist: A5/1, the 'stronger' version, and A5/2, the 'weaker' version. The… CONTINUE READING
Highly Cited
This paper has 27 citations. REVIEW CITATIONS


Publications citing this paper.
Showing 1-10 of 19 extracted citations

Analysis of Authentication and Key Establishment in Inter-generational Mobile Telephony

2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing • 2013
View 1 Excerpt

Practical Cryptanalysis of Real-World Systems

An Engineer 's Approach, Advisor Prof Christof Paar, +3 authors Kurzfassung

Angriff auf Thuraya Satellitentelefonie

Datenschutz und Datensicherheit - DuD • 2012
View 1 Excerpt


Publications referenced by this paper.

Similar Papers

Loading similar papers…