Feeds

'Sandwich attack' busts new cellphone crypto

Kasumi cipher cracked (in theory)

Security for virtualized datacentres

A new encryption scheme for protecting 3G phone networks hasn't even gone into commercial use and already cryptographers have cracked it - at least theoretically.

In a paper published Tuesday, the cryptographers showed that the Kasumi cipher, which is also referred to as A5/3, can be broken using what's known as a related-key attack, in which a message encrypted with one key is later changed to one or more different keys. The team dubbed the technique a sandwich attack because it was broken into three parts: two thick slices at the top and bottom and a thin slice in the middle.

"By using this distinguisher and analyzing the single remaining round, we can derive the complete 128 bit key of the full Kasumi by using only 4 related keys, 226 data, 230 bytes of memory, and 232 time," they wrote. "These complexities are so small that we have actually simulated the attack in less than two hours on a single PC, and experimentally verified its correctness and complexity."

The results come two weeks after a separate team released a practical method for cracking A5/1, the cipher currently used to prevent snooping on GSM networks. The technique relies on about $4,000 worth of equipment and requires the capture of only a few minutes worth of an encrypted conversation in order to break it. The attack exploits weaknesses in the decades-old cipher.

The GSM Association, which represents about 800 cellular carriers in 219 countries, has vowed to switch to the much more modern A5/3 cipher, but so far, it has provided no time line for doing so.

By contrast, the exploit against A5/3 is much less practical, because it requires an attacker to collect "several million known plaintexts" in order to deduce the key that encrypts a conversation, said Karsten Nohl, a cryptography expert and researcher at the University of Virginia. During a typical call, such plaintexts are transmitted every second or so. Still, he said the research is important because it shows the realistic limitations of the cipher.

"The attack should stand as a reminder that A5/3 and any other cipher will need to be replaced eventually," he told The Register. "Hopefully this fact is considered when upgrading GSM."

Nohl's comments are particularly poignant since the attack, limited as it may be, exploits weaknesses in the algorithm itself, rather than ways the algorithm is implemented.

The paper was published by Orr Dunkelman, Nathan Keller, and Adi Shamir, the last researcher being the S in the widely used RSA public-key encryption algorithm. They are faculty members with the Mathematics and Computer Science at the Weizmann Institute of Science in Israel. A PDF of the paper is here. ®

Beginner's guide to SSL certificates

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.