Professional Documents
Culture Documents
GSM Algorithms - Platform Security
GSM Algorithms - Platform Security
GSM Algorithms - Platform Security
The A5/1 was one of the initial GSM algorithm developed in 1987 and was designed to
The algorithm was designed to cater communication encryption within Europe. However, with
more advancement in technology in next couple of years A5/2 was developed in 1989 which
allowed a better reach and both algorithms designs were kept secret, so that the communication
is available publicly. However, in 1994 a major leak in the A5/1 and A5/2 algorithm design
allowed hackers to re-engineer the algorithm and decipher the communication which disclosed
Following the failure, COMP128 algorithm was designed to require authenticate before
the session could start and would end the session key which would make it more challenging for
hackers to decrypt. COMP128’s initial publication was leaked as well before its public release in
1998, however with advancements into 3 phases, COMP128 -1, COMP128 – 2 and COMP128 –
3, the key is more secure than ever using 64bit Key encryption.
A5/3 which is also known as KASUMI is a more advanced algorithm released in 2002
that uses Block Cipher mechanism with key size of 128bits and block sizes of 64bits making it
virtually impossible to crack. A5/3 is currently being used in GSM, UMTS and Data
communication across the world that ensures full fledge security over communication.
References
Breaking the GSM A5/1 cryptography algorithm with rainbow tables and high-end FPGAS.
In 22nd International conference on field programmable logic and applications (FPL) (pp. 747-
753). IEEE.
Security Framework
Cryptocurrencies are the buzz word globally these days, and although the cryptos are
designed to secure all possible attacks known to us till date, there are still vulnerabilities that
emerge when hackers are able to exploit the algorithms. One recent event occurred in December
2021 was on a Crypto trading platform called BitMart, wherein, the account access of over tens
of thousands of users were compromised in a large-scale security breach and hackers withdrew
over $150 million in assets within just minutes. The authorities claimed that 2 of their private
keys were stolen due to which the incident occurred, and their hot wallet accounts were
compromised, however the alarming figure of $150 million made it to the headline to which
although BitMart tried investigating the incident through third-party but were unable to trace.
Fortunately, the assets were insured, and the users will be compensated with their money, but
such an incident is surely a wake-up call for many crypto trading providers and investors who
References
CNBC, BitMart says it will compensate victims of $196 million hack and restore trading
https://www.cnbc.com/2021/12/05/hackers-take-196-million-from-crypto-exchange-bitmart-in-
large-breach.html