2009
09.13

The cracking of GSM “encryption” has been making the inter-rounds lately, and this week on the Security Now! Podcast, Steve Gibson takes a look at how badly it’s broken, and what the potential risks are. In simple terms, it means what you say on your iPhone — or any GSM phone, which includes all phones on AT&T, T-Mobile, Rogers, and almost all phones internationally — can be intercepted, decrypted, and listened to if a person has several thousand dollars worth of equipment and the motivation to do it.

In more complex terms:

“So again, we’re now at the hobby level. We’re at the level where the hobbyist with a couple thousand dollars can – needs to know nothing about radio and even hardware. And even all of the preprocessing steps for demultiplexing the data and analyzing it and performing spectrum analysis and finding the channels and everything, all of that’s been done. There’s even some people have taken – they’re not at the GPL licensing, but they are – so they’re proprietary licenses, but free, but they’re open source and free for personal use, where turnkey packages to pull all this data together have been produced. There’s even one which abstracts this USRP, this Universal Software Radio Peripheral, making it look like a network device so that Wireshark, our favorite packet capture utility, is able to capture GSM packets and decode them and show you all the bits and all the protocols and everything going on in a stream that you capture.

So, I mean, we’re way far along in making this possible. In my opinion, this GSM Alliance is – they’re saying what they have to say politically; but, if they really believe what they’re saying, that they’re in serious denial because this is no longer James Bond government-level sci-fi stuff. It would be entirely possible for a company who wanted to do some surveillance of a competitor to equip a van with some of this equipment, spending only tens of thousands of dollars, park it across the street from a competitor, aim their antennas at the competitor’s building, and spend a day just streaming in, sucking in all of the cellphone traffic that is being transacted by the employees within the building, and then drive the van off and decrypt those conversations offline afterwards and find out what was being said. I mean, it is no longer difficult to do. It’s entirely possible.”

Softwares to creat A4/1 Rainbow table (The Time/Memory Tradeoff framework is still in its early stage of development. It has been started in early 2009 and now reached basic architectural stability.)

Transcript of the netcast

Early warning in at BlackHat conference few weeks ago

ps: 2 Terabytes – this is equivalent to the amount of data contained in a 20 kilometre high pile of books.

No Comment.

Add Your Comment

You must be logged in to post a comment.