GSM Algorithms - Platform Security

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

GSM Algorithms

The A5/1 was one of the initial GSM algorithm developed in 1987 and was designed to

provide over-the-air communication and standardize the encryption of wireless communication.

The algorithm was designed to cater communication encryption within Europe. However, with

more advancement in technology in next couple of years A5/2 was developed in 1989 which

allowed a better reach and both algorithms designs were kept secret, so that the communication

is available publicly. However, in 1994 a major leak in the A5/1 and A5/2 algorithm design

allowed hackers to re-engineer the algorithm and decipher the communication which disclosed

major flaw in the usage and implementation of these algorithm.

Following the failure, COMP128 algorithm was designed to require authenticate before

the session could start and would end the session key which would make it more challenging for

hackers to decrypt. COMP128’s initial publication was leaked as well before its public release in

1998, however with advancements into 3 phases, COMP128 -1, COMP128 – 2 and COMP128 –

3, the key is more secure than ever using 64bit Key encryption.

A5/3 which is also known as KASUMI is a more advanced algorithm released in 2002

that uses Block Cipher mechanism with key size of 128bits and block sizes of 64bits making it

virtually impossible to crack. A5/3 is currently being used in GSM, UMTS and Data

communication across the world that ensures full fledge security over communication.

References

Elouafiq, A. (2012). Authentication and Encryption in GSM and 3GUMTS: An Emphasis

on Protocols and Algorithms. arXiv preprint arXiv:1204.1651.


Kalenderi, M., Pnevmatikatos, D., Papaefstathiou, I., & Manifavas, C. (2012, August).

Breaking the GSM A5/1 cryptography algorithm with rainbow tables and high-end FPGAS.

In 22nd International conference on field programmable logic and applications (FPL) (pp. 747-

753). IEEE.
Security Framework

Cryptocurrencies are the buzz word globally these days, and although the cryptos are

designed to secure all possible attacks known to us till date, there are still vulnerabilities that

emerge when hackers are able to exploit the algorithms. One recent event occurred in December

2021 was on a Crypto trading platform called BitMart, wherein, the account access of over tens

of thousands of users were compromised in a large-scale security breach and hackers withdrew

over $150 million in assets within just minutes. The authorities claimed that 2 of their private

keys were stolen due to which the incident occurred, and their hot wallet accounts were

compromised, however the alarming figure of $150 million made it to the headline to which

although BitMart tried investigating the incident through third-party but were unable to trace.

Fortunately, the assets were insured, and the users will be compensated with their money, but

such an incident is surely a wake-up call for many crypto trading providers and investors who

foresee the currency moving into the digital completely.

References

CNBC, BitMart says it will compensate victims of $196 million hack and restore trading

by Tuesday, December 13, 2021, accessed February 6, 2022 via

https://www.cnbc.com/2021/12/05/hackers-take-196-million-from-crypto-exchange-bitmart-in-

large-breach.html

You might also like