{"id":683,"date":"2009-09-13T20:50:56","date_gmt":"2009-09-13T13:50:56","guid":{"rendered":"http:\/\/deepquest.code511.com\/blog\/?p=683"},"modified":"2009-09-13T20:50:56","modified_gmt":"2009-09-13T13:50:56","slug":"gsm-encryption-cracked-know-your-risks","status":"publish","type":"post","link":"https:\/\/deepquest.code511.com\/blog\/2009\/09\/gsm-encryption-cracked-know-your-risks\/","title":{"rendered":"GSM Encryption Cracked: Know Your Risks"},"content":{"rendered":"<p>The cracking of GSM \u201cencryption\u201d has been making the\u00a0<a style=\"color: #2971a7; text-decoration: underline;\" href=\"http:\/\/www.theregister.co.uk\/2009\/09\/04\/gsm_security\/\">inter-rounds<\/a> lately, and this week on the Security Now! Podcast, Steve Gibson takes a look at how badly it\u2019s broken, and what the potential risks are. In simple terms, it means what you say on your iPhone \u2014 or any GSM phone, which includes all phones on AT&amp;T, T-Mobile, Rogers, and almost all phones internationally \u2014 can be intercepted, decrypted, and listened to if a person has several thousand dollars worth of equipment and the motivation to do it.<\/p>\n<p><!--more--><\/p>\n<p style=\"padding-top: 8px; padding-right: 0px; padding-bottom: 8px; padding-left: 0px; margin: 0px;\">In more complex terms:<\/p>\n<blockquote>\n<p style=\"padding-top: 8px; padding-right: 0px; padding-bottom: 8px; padding-left: 0px; margin: 0px;\">&#8220;So again, we\u2019re now at the hobby level. We\u2019re at the level where the hobbyist with a couple thousand dollars can \u2013 needs to know nothing about radio and even hardware. And even all of the preprocessing steps for demultiplexing the data and analyzing it and performing spectrum analysis and finding the channels and everything, all of that\u2019s been done. There\u2019s even some people have taken \u2013 they\u2019re not at the GPL licensing, but they are \u2013 so they\u2019re proprietary licenses, but free, but they\u2019re open source and free for personal use, where turnkey packages to pull all this data together have been produced. There\u2019s even one which abstracts this USRP, this Universal Software Radio Peripheral, making it look like a network device so that Wireshark, our favorite packet capture utility, is able to capture GSM packets and decode them and show you all the bits and all the protocols and everything going on in a stream that you capture.<\/p>\n<p style=\"padding-top: 8px; padding-right: 0px; padding-bottom: 8px; padding-left: 0px; margin: 0px;\">So, I mean, we\u2019re way far along in making this possible. In my opinion, this GSM Alliance is \u2013 they\u2019re saying what they have to say politically; but, if they really believe what they\u2019re saying, that they\u2019re in serious denial because this is no longer James Bond government-level sci-fi stuff. It would be entirely possible for a company who wanted to do some surveillance of a competitor to equip a van with some of this equipment, spending only tens of thousands of dollars, park it across the street from a competitor, aim their antennas at the competitor\u2019s building, and spend a day just streaming in, sucking in all of the cellphone traffic that is being transacted by the employees within the building, and then drive the van off and decrypt those conversations offline afterwards and find out what was being said. I mean, it is no longer difficult to do. It\u2019s entirely possible.&#8221;<\/p>\n<p style=\"padding-top: 8px; padding-right: 0px; padding-bottom: 8px; padding-left: 0px; margin: 0px;\"><strong><a href=\"http:\/\/reflextor.com\/trac\/a51\/\" target=\"_blank\">Softwares to creat A4\/1 Rainbow table<\/a> (The Time\/Memory Tradeoff framework is still in its early stage of development. It has been started in early 2009 and now reached basic architectural stability.)<\/strong><\/p>\n<p style=\"padding-top: 8px; padding-right: 0px; padding-bottom: 8px; padding-left: 0px; margin: 0px;\"><strong><a href=\"http:\/\/www.grc.com\/sn\/sn-213.htm\" target=\"_blank\">Transcript of the netcast<\/a><\/strong><\/p>\n<p style=\"padding-top: 8px; padding-right: 0px; padding-bottom: 8px; padding-left: 0px; margin: 0px;\"><strong><a href=\"http:\/\/www.theregister.co.uk\/2009\/09\/04\/gsm_security\/\" target=\"_blank\">Early warning in at BlackHat conference few weeks ago<\/a><\/strong><\/p>\n<p style=\"padding-top: 8px; padding-right: 0px; padding-bottom: 8px; padding-left: 0px; margin: 0px;\"><strong>ps: 2 Terabytes &#8211; this is equivalent to the amount of data contained in a 20 kilometre high pile of books.<\/strong><\/p>\n<\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>In simple terms, it means what you say on your iPhone \u2014 or any GSM phone, which includes all phones on AT&#038;T, T-Mobile, Rogers, and almost all phones internationally \u2014 can be intercepted, decrypted, and listened to if a person has several thousand dollars worth of equipment and the motivation to do it<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[60,59],"class_list":["post-683","post","type-post","status-publish","format-standard","hentry","category-security","tag-a51","tag-gsm"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4bBYZ-b1","_links":{"self":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/comments?post=683"}],"version-history":[{"count":3,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/683\/revisions"}],"predecessor-version":[{"id":686,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/posts\/683\/revisions\/686"}],"wp:attachment":[{"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/media?parent=683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/categories?post=683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/deepquest.code511.com\/blog\/wp-json\/wp\/v2\/tags?post=683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}