It was revealed that the GPRS encryption algorithm used in early mobile phones was deliberately weakened

It was revealed that the GPRS encryption algorithm used in early mobile phones was deliberately weakened

[[406364]]

A team of researchers from several European universities has just pointed out in a paper that the vulnerability of the GPRS encryption algorithm used in early mobile phones was not accidental. Subsequent facts have proved that their suspicions were correct. As Vice highlights, GEA-1 was mainly used for mobile phone data encryption in the 1990s and 2000s. The algorithm was originally thought to provide full 64-bit encryption security, but in their cryptanalysis, the research team found that its security was actually limited to 40 bits at design time.

Research Figure 1: Structure of the GEA-1 cipher stream (Source: Springer Link | PDF)

To further verify the finding, the research team also obtained more details about the GEA-A and GEA-2 algorithms from unnamed sources so that they could conduct a comprehensive analysis and identify weaknesses. The results confirmed the "unlikely" coincidence.

TechSpot pointed out that an attacker with the ability to intercept a phone's data traffic could exploit the vulnerability to decrypt all messages in a conversation.

Research Figure 2: Linear initialization of random samples of GEA-1

Vice also contacted the European Telecommunications Standards Institute (ETSI), which designed the GEA-1 encryption algorithm, and a spokesperson for the organization acknowledged in an email statement that the algorithm does contain a weakness.

But the reason it was introduced is that it was required to be present because ETSI needed to comply with export control regulations that limited the strength of GEA-1.

Research Figure 3: Overview of key generation for GEA-1 and GEA-2

Such export controls were fairly common given the international situation at the time, and The Register reported that France had enacted a similar rule that banned anything over 40-bit encryption.

Håvard Raddum, who participated in the new research, complained: "In order to cater to these restrictive policies, millions of users have been unable to obtain the safe online protection they should have for a long time."

Research Chart-4: Overview of GEA-X’s mobile phone/baseband support

However, the biggest problem revealed by this study is that no export controls were explicitly mentioned when the GEA-1 standard was formulated and launched.

Moreover, the research team found that even though the difficulty of technical operation has increased, the GEA-2 algorithm is still vulnerable to attacks.

Thankfully, neither standard has gained widespread adoption, with vendors preferring newer, more secure encryption algorithms — although networks in some markets still use them as a fallback.

<<:  What is data-driven design?

>>:  Don’t know how to design buttons? Just master these 5 golden rules

Recommend

6 steps to play Douyin blue v account

Industry development has a cycle, with major chan...

In a mobile Internet company, what are the KPIs of each department?

KPI, or key performance indicator, is a performan...

Inventory | November new media hot calendar

The hot spots that come regularly touch people...

Can you fly directly to the moon by putting on the Iron Man armor?

Follow Captain Da Shanzha Wan Set sail for the st...

All things grow with the help of the sun. Is it possible to grow without it?

For reprinting, business cooperation, please scan...

Urgent reminder! The venom is as strong as sulfuric acid, don't take pictures!

What should you do if a mosquito lands on you? Ma...

How should products and operations use big data for conversion analysis?

In the many marketing copy screen-sweeping incide...

As long as tablets are alive, one market is saturated while another is hungry.

In the first half of 2015, the number of tablet c...