It was revealed that the GPRS encryption algorithm used in early mobile phones was deliberately weakened

It was revealed that the GPRS encryption algorithm used in early mobile phones was deliberately weakened

[[406364]]

A team of researchers from several European universities has just pointed out in a paper that the vulnerability of the GPRS encryption algorithm used in early mobile phones was not accidental. Subsequent facts have proved that their suspicions were correct. As Vice highlights, GEA-1 was mainly used for mobile phone data encryption in the 1990s and 2000s. The algorithm was originally thought to provide full 64-bit encryption security, but in their cryptanalysis, the research team found that its security was actually limited to 40 bits at design time.

Research Figure 1: Structure of the GEA-1 cipher stream (Source: Springer Link | PDF)

To further verify the finding, the research team also obtained more details about the GEA-A and GEA-2 algorithms from unnamed sources so that they could conduct a comprehensive analysis and identify weaknesses. The results confirmed the "unlikely" coincidence.

TechSpot pointed out that an attacker with the ability to intercept a phone's data traffic could exploit the vulnerability to decrypt all messages in a conversation.

Research Figure 2: Linear initialization of random samples of GEA-1

Vice also contacted the European Telecommunications Standards Institute (ETSI), which designed the GEA-1 encryption algorithm, and a spokesperson for the organization acknowledged in an email statement that the algorithm does contain a weakness.

But the reason it was introduced is that it was required to be present because ETSI needed to comply with export control regulations that limited the strength of GEA-1.

Research Figure 3: Overview of key generation for GEA-1 and GEA-2

Such export controls were fairly common given the international situation at the time, and The Register reported that France had enacted a similar rule that banned anything over 40-bit encryption.

Håvard Raddum, who participated in the new research, complained: "In order to cater to these restrictive policies, millions of users have been unable to obtain the safe online protection they should have for a long time."

Research Chart-4: Overview of GEA-X’s mobile phone/baseband support

However, the biggest problem revealed by this study is that no export controls were explicitly mentioned when the GEA-1 standard was formulated and launched.

Moreover, the research team found that even though the difficulty of technical operation has increased, the GEA-2 algorithm is still vulnerable to attacks.

Thankfully, neither standard has gained widespread adoption, with vendors preferring newer, more secure encryption algorithms — although networks in some markets still use them as a fallback.

<<:  What is data-driven design?

>>:  Don’t know how to design buttons? Just master these 5 golden rules

Recommend

Marketing promotion plan: Why can’t you always write a good plan?

Why do many friends always fail to write good pro...

Two of my most memorable moments as a programmer

[[235144]] Last week, my colleagues and I had a q...

Credit card advertising and banking app user growth bottleneck

What are people competing for in the Internet cir...

Essential elements for Facebook advertising!

When it comes to Facebook, many people’s first im...

What is a 400 number? What are the numbers starting with 400 for?

The 400 telephone number is a 10-digit number. It...

The top ten e-books are free and completed, and the fantasy novels are ranked?

Due to the epidemic, many people are bored at hom...

Xiaohongshu recommendation mechanism algorithm

As an operator, I have always been paying attenti...

Tips for promoting products on Xiaohongshu!

Tips for promoting products on Xiaohongshu : How ...