Vis enkel innførsel

dc.contributor.advisorMjølsnes, Stig Frodenb_NO
dc.contributor.advisorGligoroski, Danilonb_NO
dc.contributor.authorGlendrange, Magnusnb_NO
dc.contributor.authorHove, Kristiannb_NO
dc.contributor.authorHvideberg, Espennb_NO
dc.date.accessioned2014-12-19T14:13:52Z
dc.date.available2014-12-19T14:13:52Z
dc.date.created2010-10-07nb_NO
dc.date.issued2010nb_NO
dc.identifier355716nb_NO
dc.identifierntnudaim:5478nb_NO
dc.identifier.urihttp://hdl.handle.net/11250/262321
dc.description.abstractWe have participated in the creation of almost two terabytes of tables aimed at cracking A5/1, the most common ciphering algorithm used in GSM. Given 114-bit of known plaintext, we are able to recover the session key with a hit rate of 19%. The tables are expected to be unique as they provide the best coverage yet known to the authors, and they are the first step in a real-world passive attack against GSM. An initial investigation and analysis into the air interface of GSM were performed, from both a theoretical and practical point of view. These examinations would be essential in order to utilize the generated tables in a practical attack.Additionally, a rogue GSM network was built and deployed without enabling ciphering and frequency hopping. This active attack was purely based on open-source software and hardware, implying that real GSM networks could be spoofed with resources available to the general public.nb_NO
dc.languageengnb_NO
dc.publisherInstitutt for telematikknb_NO
dc.subjectntnudaim:5478no_NO
dc.subjectSIE7 kommunikasjonsteknologino_NO
dc.subjectNett og tjenesterno_NO
dc.subjectTelematikkno_NO
dc.titleDecoding GSMnb_NO
dc.typeMaster thesisnb_NO
dc.source.pagenumber213nb_NO
dc.contributor.departmentNorges teknisk-naturvitenskapelige universitet, Fakultet for informasjonsteknologi, matematikk og elektroteknikk, Institutt for telematikknb_NO


Tilhørende fil(er)

Thumbnail
Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel