Research Article
The New Results of Correlation Attack on A5/1
@INPROCEEDINGS{10.1109/CHINACOM.2008.4685010, author={Hadi Khorrami and Mahmoud Ahmadian and Behrouz Hajian}, title={The New Results of Correlation Attack on A5/1}, proceedings={ChinaCom2008-Network and Information Security Symposium}, publisher={IEEE}, proceedings_a={CHINACOM2008-NIS}, year={2008}, month={11}, keywords={GSM; A5/1; Correlation Attack}, doi={10.1109/CHINACOM.2008.4685010} }
- Hadi Khorrami
Mahmoud Ahmadian
Behrouz Hajian
Year: 2008
The New Results of Correlation Attack on A5/1
CHINACOM2008-NIS
IEEE
DOI: 10.1109/CHINACOM.2008.4685010
Abstract
A5/1 is a stream cipher that used in GSM. So far several attacks on A5/1 have been proposed. In 2005, Maximov, Johansson and Babbage proposed a correlation attack on A5/1. In this paper we improve this attack considering three weaknesses that observed by Biham and Barkan in A5/1 and by employing graph theory for decoding the estimators that was proposed by [9]. The new results have been showed in this article.
Copyright © 2008–2024 IEEE