ChinaCom2008-Network and Information Security Symposium

Research Article

The New Results of Correlation Attack on A5/1

  • @INPROCEEDINGS{10.1109/CHINACOM.2008.4685010,
        author={Hadi Khorrami and Mahmoud Ahmadian and Behrouz Hajian},
        title={The New Results of Correlation Attack on A5/1},
        proceedings={ChinaCom2008-Network and Information Security Symposium},
        publisher={IEEE},
        proceedings_a={CHINACOM2008-NIS},
        year={2008},
        month={11},
        keywords={GSM; A5/1; Correlation Attack},
        doi={10.1109/CHINACOM.2008.4685010}
    }
    
  • Hadi Khorrami
    Mahmoud Ahmadian
    Behrouz Hajian
    Year: 2008
    The New Results of Correlation Attack on A5/1
    CHINACOM2008-NIS
    IEEE
    DOI: 10.1109/CHINACOM.2008.4685010
Hadi Khorrami1,*, Mahmoud Ahmadian1,*, Behrouz Hajian1,*
  • 1: Department of Electrical Engineering KNT University of Technology Tehran, Iran
*Contact email: hadykhorramy@gmail.com, mahmoud@eetd.kntu.ac.ir, behrouz.hajian@gmail.com

Abstract

A5/1 is a stream cipher that used in GSM. So far several attacks on A5/1 have been proposed. In 2005, Maximov, Johansson and Babbage proposed a correlation attack on A5/1. In this paper we improve this attack considering three weaknesses that observed by Biham and Barkan in A5/1 and by employing graph theory for decoding the estimators that was proposed by [9]. The new results have been showed in this article.