A number of attacks on A5/1 have been published, and the American
National Security Agency is able to routinely decrypt A5/1 messages according to released internal documents. Some attacks require an expensive preprocessing stage after which the cipher can be broken in minutes or seconds. Originally, the weaknesses were passive attacks using the
known plaintext assumption. In 2003, more serious weaknesses were identified which can be exploited in the
ciphertext-only scenario, or by an active attacker. In 2006 Elad Barkan,
Eli Biham and Nathan Keller demonstrated attacks against A5/1,
A5/3, or even GPRS that allow attackers to tap GSM mobile phone conversations and decrypt them either in real-time, or at any later time. According to professor Jan Arild Audestad, at the standardization process which started in 1982, A5/1 was originally proposed to have a key length of 128 bits. At that time, 128 bits was projected to be secure for at least 15 years. It is now believed that 128 bits would in fact also still be secure until the
advent of quantum computing. Audestad, Peter van der Arend, and
Thomas Haug says that the British insisted on weaker encryption, with Haug saying he was told by the British delegate that this was to allow the British secret service to eavesdrop more easily. The British proposed a key length of 48 bits, while the West Germans wanted stronger encryption to protect against East German spying, so the compromise became a key length of 54 bits.
Known-plaintext attacks The first attack on the A5/1 was proposed by
Ross Anderson in 1994. Anderson's basic idea was to guess the complete content of the registers R1 and R2 and about half of the register R3. In this way the clocking of all three registers is determined and the second half of R3 can be computed. This attack does not require a preprocessing stage. In 2004, Maximov
et al. improved this result to an attack requiring "less than one minute of computations, and a few seconds of known conversation". The attack was further improved by
Elad Barkan and
Eli Biham in 2005.
Attacks on A5/1 as used in GSM In 2003, Barkan
et al. published several attacks on GSM encryption. The first is an active attack. GSM phones can be convinced to use the much weaker
A5/2 cipher briefly. A5/2 can be broken easily, and the phone uses the same key as for the stronger A5/1 algorithm. A second attack on A5/1 is outlined, a
ciphertext-only time-memory tradeoff attack which requires a large amount of precomputation. In 2006,
Elad Barkan,
Eli Biham,
Nathan Keller published the full version of their 2003 paper, with attacks against A5/X сiphers. The authors claim: In 2007
Universities of Bochum and Kiel started a research project to create a massively parallel
FPGA-based cryptographic accelerator COPACOBANA. COPACOBANA was the first commercially available solution ==See also==