Some Results on Algebraic Cryptanalysis of A5/2 Algorithm

Authors

  • Adela Mihaita University of Bucharest, Romania

Keywords:

cryptanalysis, A5

Abstract

Algebraic cryptanalysis of A5/2 cipher is the is the subject of this article. Recovering the secret key is reduced to solving a system with several hundreds of quadratic equations for which various methods have been proposed during years. This paper presents some experimental results (concerning the time and the number of frames needed) using different implementations of Groebner basis algorithm for solving the system.

Author Biography

Adela Mihaita, University of Bucharest, Romania

Faculty of Mathematics and Computer Science

References

Mehreen Afzal, Ashraf Masood, Naveed Shehzad Improved Results on Algebraic Cryptanalysis of A5/2, Global E-Security. Springer Berlin Heidelberg, 2008

Elad Barkan, Eli Biham, Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication, (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 600616. Springer, Heidelberg (2003)

Nicolas Courtois, Alexander Klimov, Jacques Patarin, Adi Shamir Eficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations, EUROCrYPT, 2000

Slobodan Petrovic, Amparo Fuster-Sabater : Cryptanalysis of the A5/2 Algorithm, IACR ePrint Report 200/52 (2000)

Martin Kreuzer, Lorenzo Robbiano Computational Commutative Algebra 2, Springer-Verlag Berlin Heidelberg, 2005

Marc Briceno, Ian Goldberg, David Wagner A Pedagogical Implementation of the GSM A5/1 and A5/2 Voice Privacy Encryption Algorithms (1999),

Slobodan Petrovic, Amparo Fuster-Sabater CRYPTANALYSIS OF THE A5/2 ALGORITHM

Mehreen Afzal, Ashraf Masood On Generating Algebraic Equations for A5-Type Key Stream Generator, Trends in Intelligent Systems and Computer Engineering Series. LNEE, vol. 6, pp. 443451. Springer, US; An extended version of Algebraic Attack on A5-Type Irregularly Clocked Key Stream Generator. In: Proc. International Multiconference of Engineers and Computer Scientists-IMECS 2007, IAENG (March 2007)

http://cocoa.dima.unige.it/

http://www.sagemath.org/

MAGMA Computational Algebra System, http://magma.maths.usyd.edu.au/

Downloads

Published

2010-06-30

How to Cite

Mihaita, A. (2010). Some Results on Algebraic Cryptanalysis of A5/2 Algorithm. Journal of Mobile, Embedded and Distributed Systems, 2(1), 1-7. Retrieved from http://www.jmeds.eu/index.php/jmeds/article/view/Some-Results-on-Algebraic-Cryptanalysis-of-A5-Algorithm