Motorola Secure Phone

Piete Brooks Piete.Brooks at cl.cam.ac.uk
Sun Dec 17 14:33:43 PST 1995


> I got the following from mjos at math.jyu.fi a couple of months ago.
> Unfortunately I was unable to attend or listen on mbone.  Does anyone
> know more about this?

Yes -- we have analogue A/V on a VHS cassette, digital MBone recording on M/O,
and an abstract ... see below.

>>                  University of Cambridge Computer Laboratory
>>                                SEMINAR SERIES
>> 10th October    Bill Chambers, King's College, London
>>                PROBLEMS OF STREAM CIPHER GENERATORS WITH MUTUAL CLOCK CONTROL
>> GSM:n salausalgoritmi on juuri tuota tyyppiä. Chambers yritti pitää tuota
>> nimenomaista esitelmää jo yli vuosi sitten, mutta silloin viralliset tahot
>> puuttuivat asiaan ja esitys peruttiin. Hän on löytänyt algoritmista aukkoja,
>> joiden avulla purkuaika saadaan erittäin lyhyeksi.
>> ps. ne meistä, jotka pääsevät mboneen käsiksi, voivat seurata tapahtumia
>>     livenä  :)
> [Free translation: The GSM encryption algorithm is of exactly that
> type.  Chambers tried to have this particular presentation over an
> year ago, but at that time the official side interfered and the
> presentation was cancelled.  He has found holes in the algorithm that
> can be used to make decryption (without key) very quick.
> PS.  Those of us who can get access to mbone, can follow it live.]

<TITLE>Security Group Seminar, 10th October 1995</TITLE>
<H1>Security Group Seminar, 10th October 1995</H1>

  <HR>
  <DL>
    <DT>Speaker:
      <DD>Bill Chambers, King's College, University of London<P>

    <DT>Date:
      <DD>Tuesday 10th October<P>

    <DT>Place:
      <DD>Room TP4, Computer Laboratory<P>

    <DT>Title:
      <DD>PROBLEMS OF STREAM CIPHER GENERATORS WITH MUTUAL CLOCK CONTROL<P>
  </DL>

    The speaker has been looking at the cycle structure of an algorithm
    posted just over a year ago on the Internet and alleged to be the
    secret A5 algorithm used for confidentiality in the GSM mobile
    telephone system. This algorithm employs three mutually
    clock-controlled shift registers, and can fairly quickly enter a
    loop with what is essentially the shortest possible period, a
    number very small compared with the total number of states, or even
    its square root. Moreover this behaviour is robust, not being
    influenced by factors such as choice of primitive feedback
    polynomial or even clocking logic (with a proviso to be
    discussed).  A fairly straightforward explanation for this
    behaviour has been found. Some ways of getting around the problem
    of excessively short periods are considered, as well as the
    behaviour of systems with different numbers of mutually clocked
    registers. In particular a mention is made of the wartime T52e
    cipher, perhaps the inspiration for "alleged A5".<P>






More information about the cypherpunks-legacy mailing list