Breaking the GSM A5/1 cryptography algorithm with rainbow tables and high-end FPGAS

A5 is the basic cryptographic algorithm used in GSM cell-phones to ensure that the user communication is protected against illicit acts. The A5/1 version was developed in 1987 and has since been under attack. The most recent attack on A5/1 is the "A51 security project", led by Karsten Nohl...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Kalenderi, M., Pnevmatikatos, D., Papaefstathiou, I., Manifavas, C.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 753
container_issue
container_start_page 747
container_title
container_volume
creator Kalenderi, M.
Pnevmatikatos, D.
Papaefstathiou, I.
Manifavas, C.
description A5 is the basic cryptographic algorithm used in GSM cell-phones to ensure that the user communication is protected against illicit acts. The A5/1 version was developed in 1987 and has since been under attack. The most recent attack on A5/1 is the "A51 security project", led by Karsten Nohl that consists of the creation of rainbow tables that map the internal state of the algorithm with the keystream. Rainbow tables are efficient structures that allow the tradeoff between run-time (computations performed to crack a conversation) and space (memory to hold pre-computed information). In this paper we describe a very effective parallel architecture for the creation of the A5/1 rainbow tables in reconfigurable hardware. Rainbow table creation is the most expensive portion of cracking a particular encrypted information exchange. Our approach achieves almost 3000× speedup over a single processor, and 2.5× speedup compared to GPUs. This performance is achieved with less than 5 Watt power consumption, achieving an energy efficiency in the order of 150x better that the GPU approach.
doi_str_mv 10.1109/FPL.2012.6339146
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6339146</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6339146</ieee_id><sourcerecordid>6339146</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-29453f88d29a43767449bf1d99990a20f41341c306d72530ade7c881fbd52d913</originalsourceid><addsrcrecordid>eNo9kD1rwzAYhNUvaJpmL3TRH3CiV69sSWMa4rSQ0oAzdAuyJdtqHSfIhpB_X0PT3vDcwcENR8gTsCkA07N0s55yBnyaIGoQyRV5GCiR8zjBazICLZIIhFI3ZKKl-uukvP3v5Oc9mXTdFxukQKGQI5K9BGe-fVvRvnZ0lb3TeTwDWoTzsT9UwRzrMzVNdQi-r_f0NJAG49v8cKK9yRvXUdNaWvuqjtwQ0s1qnj2Su9I0nZtcfEy26XK7eI3WH6u3xXwdec36iGsRY6mU5doIlIkUQuclWD2IGc5KASigQJZYyWNkxjpZKAVlbmNuNeCYPP_Oeufc7hj83oTz7nIP_gAUiFIB</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Breaking the GSM A5/1 cryptography algorithm with rainbow tables and high-end FPGAS</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Kalenderi, M. ; Pnevmatikatos, D. ; Papaefstathiou, I. ; Manifavas, C.</creator><creatorcontrib>Kalenderi, M. ; Pnevmatikatos, D. ; Papaefstathiou, I. ; Manifavas, C.</creatorcontrib><description>A5 is the basic cryptographic algorithm used in GSM cell-phones to ensure that the user communication is protected against illicit acts. The A5/1 version was developed in 1987 and has since been under attack. The most recent attack on A5/1 is the "A51 security project", led by Karsten Nohl that consists of the creation of rainbow tables that map the internal state of the algorithm with the keystream. Rainbow tables are efficient structures that allow the tradeoff between run-time (computations performed to crack a conversation) and space (memory to hold pre-computed information). In this paper we describe a very effective parallel architecture for the creation of the A5/1 rainbow tables in reconfigurable hardware. Rainbow table creation is the most expensive portion of cracking a particular encrypted information exchange. Our approach achieves almost 3000× speedup over a single processor, and 2.5× speedup compared to GPUs. This performance is achieved with less than 5 Watt power consumption, achieving an energy efficiency in the order of 150x better that the GPU approach.</description><identifier>ISSN: 1946-147X</identifier><identifier>ISBN: 9781467322577</identifier><identifier>ISBN: 1467322571</identifier><identifier>EISSN: 1946-1488</identifier><identifier>EISBN: 1467322563</identifier><identifier>EISBN: 9781467322560</identifier><identifier>EISBN: 1467322555</identifier><identifier>EISBN: 9781467322553</identifier><identifier>DOI: 10.1109/FPL.2012.6339146</identifier><language>eng</language><publisher>IEEE</publisher><subject>Clocks ; Cryptography ; Field programmable gate arrays ; GSM ; Hardware ; Registers ; Software</subject><ispartof>22nd International Conference on Field Programmable Logic and Applications (FPL), 2012, p.747-753</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6339146$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,777,781,786,787,2052,27906,54901</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6339146$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Kalenderi, M.</creatorcontrib><creatorcontrib>Pnevmatikatos, D.</creatorcontrib><creatorcontrib>Papaefstathiou, I.</creatorcontrib><creatorcontrib>Manifavas, C.</creatorcontrib><title>Breaking the GSM A5/1 cryptography algorithm with rainbow tables and high-end FPGAS</title><title>22nd International Conference on Field Programmable Logic and Applications (FPL)</title><addtitle>FPL</addtitle><description>A5 is the basic cryptographic algorithm used in GSM cell-phones to ensure that the user communication is protected against illicit acts. The A5/1 version was developed in 1987 and has since been under attack. The most recent attack on A5/1 is the "A51 security project", led by Karsten Nohl that consists of the creation of rainbow tables that map the internal state of the algorithm with the keystream. Rainbow tables are efficient structures that allow the tradeoff between run-time (computations performed to crack a conversation) and space (memory to hold pre-computed information). In this paper we describe a very effective parallel architecture for the creation of the A5/1 rainbow tables in reconfigurable hardware. Rainbow table creation is the most expensive portion of cracking a particular encrypted information exchange. Our approach achieves almost 3000× speedup over a single processor, and 2.5× speedup compared to GPUs. This performance is achieved with less than 5 Watt power consumption, achieving an energy efficiency in the order of 150x better that the GPU approach.</description><subject>Clocks</subject><subject>Cryptography</subject><subject>Field programmable gate arrays</subject><subject>GSM</subject><subject>Hardware</subject><subject>Registers</subject><subject>Software</subject><issn>1946-147X</issn><issn>1946-1488</issn><isbn>9781467322577</isbn><isbn>1467322571</isbn><isbn>1467322563</isbn><isbn>9781467322560</isbn><isbn>1467322555</isbn><isbn>9781467322553</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2012</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNo9kD1rwzAYhNUvaJpmL3TRH3CiV69sSWMa4rSQ0oAzdAuyJdtqHSfIhpB_X0PT3vDcwcENR8gTsCkA07N0s55yBnyaIGoQyRV5GCiR8zjBazICLZIIhFI3ZKKl-uukvP3v5Oc9mXTdFxukQKGQI5K9BGe-fVvRvnZ0lb3TeTwDWoTzsT9UwRzrMzVNdQi-r_f0NJAG49v8cKK9yRvXUdNaWvuqjtwQ0s1qnj2Su9I0nZtcfEy26XK7eI3WH6u3xXwdec36iGsRY6mU5doIlIkUQuclWD2IGc5KASigQJZYyWNkxjpZKAVlbmNuNeCYPP_Oeufc7hj83oTz7nIP_gAUiFIB</recordid><startdate>201208</startdate><enddate>201208</enddate><creator>Kalenderi, M.</creator><creator>Pnevmatikatos, D.</creator><creator>Papaefstathiou, I.</creator><creator>Manifavas, C.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201208</creationdate><title>Breaking the GSM A5/1 cryptography algorithm with rainbow tables and high-end FPGAS</title><author>Kalenderi, M. ; Pnevmatikatos, D. ; Papaefstathiou, I. ; Manifavas, C.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-29453f88d29a43767449bf1d99990a20f41341c306d72530ade7c881fbd52d913</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Clocks</topic><topic>Cryptography</topic><topic>Field programmable gate arrays</topic><topic>GSM</topic><topic>Hardware</topic><topic>Registers</topic><topic>Software</topic><toplevel>online_resources</toplevel><creatorcontrib>Kalenderi, M.</creatorcontrib><creatorcontrib>Pnevmatikatos, D.</creatorcontrib><creatorcontrib>Papaefstathiou, I.</creatorcontrib><creatorcontrib>Manifavas, C.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Kalenderi, M.</au><au>Pnevmatikatos, D.</au><au>Papaefstathiou, I.</au><au>Manifavas, C.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Breaking the GSM A5/1 cryptography algorithm with rainbow tables and high-end FPGAS</atitle><btitle>22nd International Conference on Field Programmable Logic and Applications (FPL)</btitle><stitle>FPL</stitle><date>2012-08</date><risdate>2012</risdate><spage>747</spage><epage>753</epage><pages>747-753</pages><issn>1946-147X</issn><eissn>1946-1488</eissn><isbn>9781467322577</isbn><isbn>1467322571</isbn><eisbn>1467322563</eisbn><eisbn>9781467322560</eisbn><eisbn>1467322555</eisbn><eisbn>9781467322553</eisbn><abstract>A5 is the basic cryptographic algorithm used in GSM cell-phones to ensure that the user communication is protected against illicit acts. The A5/1 version was developed in 1987 and has since been under attack. The most recent attack on A5/1 is the "A51 security project", led by Karsten Nohl that consists of the creation of rainbow tables that map the internal state of the algorithm with the keystream. Rainbow tables are efficient structures that allow the tradeoff between run-time (computations performed to crack a conversation) and space (memory to hold pre-computed information). In this paper we describe a very effective parallel architecture for the creation of the A5/1 rainbow tables in reconfigurable hardware. Rainbow table creation is the most expensive portion of cracking a particular encrypted information exchange. Our approach achieves almost 3000× speedup over a single processor, and 2.5× speedup compared to GPUs. This performance is achieved with less than 5 Watt power consumption, achieving an energy efficiency in the order of 150x better that the GPU approach.</abstract><pub>IEEE</pub><doi>10.1109/FPL.2012.6339146</doi><tpages>7</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1946-147X
ispartof 22nd International Conference on Field Programmable Logic and Applications (FPL), 2012, p.747-753
issn 1946-147X
1946-1488
language eng
recordid cdi_ieee_primary_6339146
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Clocks
Cryptography
Field programmable gate arrays
GSM
Hardware
Registers
Software
title Breaking the GSM A5/1 cryptography algorithm with rainbow tables and high-end FPGAS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-18T02%3A07%3A27IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Breaking%20the%20GSM%20A5/1%20cryptography%20algorithm%20with%20rainbow%20tables%20and%20high-end%20FPGAS&rft.btitle=22nd%20International%20Conference%20on%20Field%20Programmable%20Logic%20and%20Applications%20(FPL)&rft.au=Kalenderi,%20M.&rft.date=2012-08&rft.spage=747&rft.epage=753&rft.pages=747-753&rft.issn=1946-147X&rft.eissn=1946-1488&rft.isbn=9781467322577&rft.isbn_list=1467322571&rft_id=info:doi/10.1109/FPL.2012.6339146&rft_dat=%3Cieee_6IE%3E6339146%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=1467322563&rft.eisbn_list=9781467322560&rft.eisbn_list=1467322555&rft.eisbn_list=9781467322553&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6339146&rfr_iscdi=true