December 30, 2009

German hacker claims to have broken cell phone encryption
— Purple Avenger

If true, this is scary, very scary, and will cost billions to resolve.

A German hacker claims to have cracked the encryption that protects most cellphone calls, potentially paving the way for others to eavesdrop on conversations.

The claim, if true, could pose a threat to many wireless carriers who have used essentially the same security on their networks for years...

The security aspects are bad enough, but there's undoubtedly a crapload of gear out in the field that has this encryption burned into ROM's and otherwise not easily reconfigured methods.

That's one of the constant worries with embedded encryption tech -- if its easy for YOU to upgrade/change, then its also easier for someone else to do the same. A cheap mask programmed ROM is physically incapable of being altered remotely...which is a good thing...until the time comes that the code it contained exhibits a weakness. Now you gotta physically go out into the field and start swapping ROM's in gear...unless the ROM has been soldered down, in which case, now you're swapping whole boards out...which means you have to make new boards...distribute those boards, etc, etc.

It will be interesting to see how this plays out. It may just be BS and the German is hoaxing, but if he's not, telecom companies and their customers are going to get hit with some pretty big one-time expenses fairly soon.

Posted by: Purple Avenger at 10:05 AM | Comments (109)
Post contains 247 words, total size 2 kb.

1 Now how will I have phone sex with Helen Thomas without anyone knowing?

Posted by: lorien1973 at December 30, 2009 10:08 AM (IhQuA)

2 I'm not too worried.

Posted by: Vic at December 30, 2009 10:09 AM (QrA9E)

3 Not worried either I'm still using smoke signals, don't own a cell phone and never will.

Posted by: 'Nam Grunt at December 30, 2009 10:10 AM (nmfvn)

4 Geez, can a guy catch a break here?

Posted by: Tiger Woods at December 30, 2009 10:11 AM (Q41Zh)

5

Be the first on your block to get the new and improved Secure Phonee technology. Just $99.99 plus activation.

It's what all the cool kids are doing. Comes in pink, too.

Posted by: Rodent Liberation Front at December 30, 2009 10:11 AM (dQdrY)

6

The report is distorted. What they did was to reverse engineer the encryption algorithm. That's not the same as "cracking" it.

It does open the cipher up to a brute force attack, but since it's a 64-bit key that isn't really trivial.

Posted by: Steven Den Beste at December 30, 2009 10:12 AM (+rSRq)

7 I always assume that Barry's flying monkeys are listening in and modify my conversations accordingly. 

Posted by: Peaches at December 30, 2009 10:12 AM (9Wv2j)

8

sheesh, I wish he would have kept his mouth shut.   This is just like the airlines, you don't need "Real" security, you just need people to THINK you've got security. 

If you've got that, you've got it made.  And you can explain anything that goes wrong as "'jes one a' them things can't do nothin' about."

Posted by: Janet Napolitano at December 30, 2009 10:13 AM (T1boi)

9 The hack doesn't affect 3G.  Can you hear me now GSM? 

Posted by: California Red at December 30, 2009 10:13 AM (7uWb8)

10 Also, no one uses masked ROMs in this kind of product any longer. They all use flash ROM, which is field programmable. That's why you can get a firmware upgrade for your phone at the phone store.

Posted by: Steven Den Beste at December 30, 2009 10:14 AM (+rSRq)

11

O/T  That baby lace wigs deal off to the right can't hold a candle to these folks.  Check out the "Samuel L."

http://tinyurl.com/sxezv

 

Posted by: Chefess (formerly RushBabe) at December 30, 2009 10:15 AM (LKkE8)

12

On the SANS site, there was a quote "the industry group that developed GSM said Nohl's actions were illegal." So there you go - it was illegal, so nobody can use it. I feel much safer already, much like I accept JaNo's assurances that the system worked and air travel is safe.

http://tinyurl.com/ydv2qr6

 

Posted by: 141 Driver at December 30, 2009 10:15 AM (JFNQ7)

13 5.8 just south of Cali border, michael moore must have fallen out of his hammock!

Posted by: 'Nam Grunt at December 30, 2009 10:15 AM (nmfvn)

14

Ace or someone needs to do a post about this

http://tiny.cc/Rkx2N

Some kid got grounded because of his sister and posts scans of her diary on facebook, complete with guys she wants to bang who then go on to write comments on it ridiculing her.

Posted by: Mr. Pink at December 30, 2009 10:16 AM (SqAkN)

15 OT  Stupid Debbie Dingell:

"I'm appalled that Republicans are 'particizing' this security issue...."

Just now on Fox.  Debbie's been dippin' into the last of the egg nog.

Posted by: Intrepid at December 30, 2009 10:17 AM (92zkk)

16 Purple Avenger, this is not even conceivably a hoax. The story was covered on /. in the last couple days, and he released the code at at the Chaos conference. A good summary is here. http://tinyurl.com/yah7ek5 A torrent containing the code is available right now, which I won't bother to link.

Posted by: reichwingnut at December 30, 2009 10:17 AM (1bQOq)

17 If this is true, for punishment he should have to listen to my phone calls, read my emails,  review my medical records.  For good measure make him look at my millimeter body scans. 

Posted by: tmitsss at December 30, 2009 10:18 AM (V4Pya)

18

Not really off topic - The most convincing SAP Business Objects advertisement EVAH!

Makes me want to get busy doing business with my object until SAPped.

Posted by: Hussein the Plumber at December 30, 2009 10:19 AM (r1h5M)

19 I have a cell phone. Sometimes, rarely, I even turn it on.

Posted by: maddogg at December 30, 2009 10:20 AM (OlN4e)

20 So when I call my wife and tell her I'm going to be a little late for dinner, someone else may be listening!!! Oh, the horror!!!

Posted by: RoadRunner at December 30, 2009 10:20 AM (VUjE6)

21 Hussein, is there a blog of how many companies have been brought to their knees by SAP? I know at least one major medical device co. Hint: they do optics.

Posted by: reichwingnut at December 30, 2009 10:21 AM (pIKTP)

22 21- Max Baucus still upset about being caught drunk, I see.

Posted by: Hussein the Plumber at December 30, 2009 10:23 AM (r1h5M)

23 ... we will just fix it in software ...

Posted by: Jean at December 30, 2009 10:25 AM (5ddCw)

24 22- Don't know but every now the add pops up and is pretty interesting, imo.

Posted by: Hussein the Plumber at December 30, 2009 10:26 AM (r1h5M)

25 If they somehow stumble upon my conversations, they might learn a thing or two about winning at fantasy football.

Posted by: GregInSeattle at December 30, 2009 10:27 AM (B5cM9)

26 Ha Ha....I don't even speak German. Jokes on them

Posted by: rum, sodomy and the lash at December 30, 2009 10:27 AM (AnTyA)

27 The really don't encrypt that much of the call anyway.  Usually just the call setup (with the billing information) for most cell phone calls.

Anybody who thinks that their cell call can't be overheard isn't dealing with a full deck.

Posted by: Neo at December 30, 2009 10:28 AM (tE8FB)

28 Let's not jump to conclusions.

Posted by: BO at December 30, 2009 10:29 AM (ZsIeo)

29 Fffft.  Baby wigs?  Un-funny rip off of cats-with-wigs.

Posted by: HeatherRadish at December 30, 2009 10:30 AM (NtiET)

30 We worry about cell phones being overheard but we don't worry about idiots getting on planes with one way tickies paid for in cash and no bags. In the words of Satchmo, what a wonderful world!

Posted by: rightzilla at December 30, 2009 10:30 AM (rVJH4)

31

... telecom companies and their customers are going to get hit with some pretty big one-time expenses fairly soon.

There! Justification for a new federal tax on ... will it be cell phone service, or DSL?

Posted by: Michael Rittenhouse at December 30, 2009 10:30 AM (2QFX4)

32 This is not germaine to the problem. /Sheriff T. Justice Smokey & the Bandit

Posted by: 'Nam Grunt at December 30, 2009 10:31 AM (nmfvn)

33 12

On the SANS site, there was a quote "the industry group that developed GSM said Nohl's actions were illegal." So there you go - it was illegal, so nobody can use it. I feel much safer already, much like I accept JaNo's assurances that the system worked and air travel is safe.

http://tinyurl.com/ydv2qr6

 

Posted by: 141 Driver at December 30, 2009 02:15 PM (JFNQ7)

The lamer the refutation, the more serious the problem.

"It's ILLEGAL!" I'd be embarrassed to say something that stupid and if that's the best they cam come up with then potentially this is a huge problem.

Posted by: Jim in San Diego at December 30, 2009 10:31 AM (F09Uo)

34 10, "Also, no one uses masked ROMs in this kind of product any longer. They all use flash ROM, which is field programmable. That's why you can get a firmware upgrade for your phone at the phone store." Posted by: Steven Den Beste | Phones and field gear are also more sophisticated that you are implying. The encyption handled by the co-processors is lower level than the main CPU, and does not use flashable ROM in most instances. Flash is more expensive, superfluous for a permanent (until EOL at least) encryption layer, and often on chip in a small ROM area. ;-)

Posted by: reichwingnut at December 30, 2009 10:31 AM (5ddCw)

35

Privacy is of great concern to me. That's I only speak near extinct native american languages on cell phone calls.

Yah-ze muthaf*ckaz!

Posted by: Dirk Diggler at December 30, 2009 10:33 AM (2EbLc)

36

OT

Dammit Texas Tech (I got my engineering degree there) has fired Mike Leach. The best football coach they ever had.

Posted by: maddogg at December 30, 2009 10:33 AM (OlN4e)

37 37, Just because he made Craig James son stand in a shed? Please!

Posted by: 'Nam Grunt at December 30, 2009 10:35 AM (nmfvn)

38 That's why you can get a firmware upgrade for your phone at the phone store.

Or your local mobbed up criminal who does phone cloning...

Having crypto reprogramming tech distributed at thousands and thousands of locations, staffed by thousands and thousands of random joyously happy employees, all of who undoubtedly are of the utmost sterling character and would never think of doing anything even remotely criminal, sounds completely risk free to me.  What could possibly go wrong?

Posted by: Purple Avenger at December 30, 2009 10:36 AM (YO0c+)

39 Wtf is wrong with males in this Country? Seems to me many are becoming pussified.

Posted by: 'Nam Grunt at December 30, 2009 10:36 AM (nmfvn)

40 Since all cell phone calls consist of: (at least the dozens I'm forced to listen to every day!)

Caller 1:  What are you up to?
Caller2:  Nothing, how about you?
Caller 1: Nothing.  I'll call you back.
Caller 2: Or I'll call you.

absolutely no one should care about the loss of encryption.

Posted by: dfbaskwill at December 30, 2009 10:37 AM (7Gs5S)

41

Wait..what the fuck.?? I have this (AnTyA) attached to every comment

Ace, you facist, Nazi fuck...are you tracking me?

Posted by: rum, sodomy and the lash at December 30, 2009 10:37 AM (AnTyA)

42 Oh, and 64 bit crypto is pretty weak these days.  Hot shit 10 years ago, but today its only one step beyond nothing with the cheap compute power available.

Posted by: Purple Avenger at December 30, 2009 10:38 AM (YO0c+)

43 If anybody is really THAT interested in hearing me say "Yes, dear....yes, dear...YES, dear...."  then they're sadder bastards than I am.

Posted by: nickless at December 30, 2009 10:41 AM (MMC8r)

44
So some kraut is going to know I'm picking up a gallon of milk and some Eggos® for my wife on the way home from work.

Why are my nuts still all loosy-goosy over this?

Posted by: Dang at December 30, 2009 10:42 AM (UA4gE)

45 If anybody is really THAT interested in hearing me say "Yes, dear....yes, dear...YES, dear...."  then they're sadder bastards than I am.

They're not interested in that.  They're interested in jacking your ID and using it to ring up thousands of dollars in calls that will appear on your bill.

Posted by: Purple Avenger at December 30, 2009 10:43 AM (YO0c+)

46 On the plus side - if true and there is going to be a big one time "service" fee I am sure as we sit here Rahm is trying to figure out how he can get a one time cellphone tax through to coincide with the service fee to take even more of our money....and how he can blame Bush.

Posted by: Mallamutt at December 30, 2009 10:43 AM (hKyl0)

47 I have a cell phone. Sometimes, rarely, I even turn it on.

Same here. I prolly use the alarm feature more than anything else. I just never warmed up to them. Nice to have in an emergency, tho.

Posted by: Soap MacTavish at December 30, 2009 10:44 AM (554T5)

48 But in every John Grisham book, the hero has a cellphone that is completely safe from hacking. Maybe the telcoms should just talk to Grisham - he seems to have the answers.

Posted by: Mallamutt at December 30, 2009 10:45 AM (hKyl0)

49

They're not interested in that.  They're interested in jacking your ID and using it to ring up thousands of dollars in calls that will appear on your bill

Yesssss...I'm covered.... unlimited calling plan...woo hoo

Posted by: rum, sodomy and the lash at December 30, 2009 10:47 AM (AnTyA)

50 Awesome.  So now not only will your cell phone give you brain cancer, someone can jack your ID and ring up large phone bills on you AND listen to your conversations and snag your homemade pron videos/pics.

Posted by: CDR M at December 30, 2009 10:47 AM (cvmTR)

51 If they hacked odumbass phone all they would hear is present.

Posted by: 'Nam Grunt at December 30, 2009 10:48 AM (nmfvn)

52 A couple of on-topic points:

The encryption algorithm was already known to be weak, and a replacement has been devised (years ago) and is built into the vast majority of cell phones and base stations. They're not using it now because the carriers haven't wanted to hassle it.

The attack should be very practical in a few months - it requires about two terabytes of rainbow tables to allow for near-real-time decryption. Two terabytes isn't a terribly large number anymore, and the rainbow tables have been under construction for quite a long time now.

Posted by: Evil Red Scandi at December 30, 2009 10:48 AM (erlfI)

53

39 That's why you can get a firmware upgrade for your phone at the phone store

I would rather get a FIREARM upgrade to take care of the sitcheeeeation!

Posted by: rightzilla at December 30, 2009 10:48 AM (rVJH4)

54 IF I get hacked and the phone bill goes up.....not my problem. Phone compmay takes it in the shorts so they can worry about the encryption.

Posted by: rightzilla at December 30, 2009 10:50 AM (rVJH4)

55 "Hallo....Hallo! Vee vill noghw leesten to Tiger as he vispers sveet nuttings to hees ho."

Posted by: german hacker at December 30, 2009 10:51 AM (rVJH4)

56

it requires about two terabytes of rainbow tables to allow for near-real-time decryption

Seriously...WTF are you talking about??

...seriously

Posted by: rum, sodomy and the lash at December 30, 2009 10:51 AM (AnTyA)

57

If they hacked odumbass phone all they would hear is present.

And uh, ummm, uh, yes Michelle.....................

Posted by: Mallamutt at December 30, 2009 10:52 AM (hKyl0)

58 "It does open the cipher up to a brute force attack, but since it's a 64-bit key that isn't really trivial."

Really?

Why do banks use 256-bit encryption and on up?

Which is not 4 times stronger, it's a whole lot stronger.

Finally, 64-bit keys have been broken before by brute force attacks. Nothing higher than 64-bit thus far, but 64? Yeah.

Posted by: Christoph at December 30, 2009 10:52 AM (0fq7b)

59 58, Or, let me get another baggy of Maui wowie, just give it to the SS agent, Allah Akbar.

Posted by: 'Nam Grunt at December 30, 2009 10:54 AM (nmfvn)

60 BRUTE FORCE??/ Yeah baby....bring it on

Posted by: Wookie at December 30, 2009 10:54 AM (rVJH4)

61 The future of mobile phone technology likely involves the ability to purchase items via the device in a secure way, like has been done in Europe. The GSM break among other problems complicates their standard. In the US, our lack of a unified transmission protocol, and the vendor lock-in a crippling of phones (no SIM, altered/locked down/low feature firmware) are issues that will have to be overcome. In the immediate future the only option likely to available for a long time is SSL web browsing via a data connection on the phone. In addition, there are going to be patent wars and bullshit ala the "wireless N standard" for years before we have any remotely acceptable way of storing payment/ID information in the cellphone/PDA. We can't even build VOTING MACHINES. Plus, with GPS and the rampant abuse by law enforcement requesting that type of info for consumers accounts will stand in the way of informed people latching on to future tech. There are numerous important issues, I could go on and on.

Posted by: reichwingnut at December 30, 2009 10:54 AM (Scxfk)

Posted by: GregInSeattle at December 30, 2009 10:54 AM (B5cM9)

63 I'm gonna hack Allahpundit's iPhone and read all his mash notes to Meaghan McCain.

Posted by: nickless at December 30, 2009 10:54 AM (MMC8r)

64 Crazy Germans. Last time they broke communication codes, Poland got it in the ass.

Posted by: Dr. Spank at December 30, 2009 10:55 AM (muUqs)

65 I like my privacy as much as the next guy, lets look into the penumbra!

Posted by: Hugo Black and William O. Douglas at December 30, 2009 10:55 AM (rVJH4)

66

I vas listening in on Ace..

...vat means "I tossed his salad and then he dorked me up the squeakhole"?

Posted by: Another German Hacker at December 30, 2009 10:56 AM (AnTyA)

67 Body scanners and cell phone hackers. I need to lose weight. And get a life.

Posted by: di butler at December 30, 2009 10:57 AM (S3xX1)

68 "I have a cell phone. Sometimes, rarely, I even turn it on."

Cell phones can be turned on remotely. (Just like college girls.)

Now not just by local law enforcement, but by anyone who breaks your phone's encryption, can listen in to your conversations, track your locations, and even as pointed out above access your porn.

Posted by: Christoph at December 30, 2009 10:57 AM (0fq7b)

Posted by: Christoph at December 30, 2009 10:58 AM (0fq7b)

70 57

it requires about two terabytes of rainbow tables to allow for near-real-time decryption

Seriously...WTF are you talking about??

...seriously

Posted by: rum, sodomy and the lash at December 30, 2009 02:51 PM (AnTyA)

Rainbow Tables http://tiny.cc/G5Qry

If you can store your tables in RAM (easier said that done with 2TB - but doable) you can do damn near real time solutions. A cheap cluster with some fast interconnects could do this.

Posted by: Jim in San Diego at December 30, 2009 10:58 AM (F09Uo)

71 Also, Purple Avenger, I can't understand the skepticism in your post re: this being 'BS'. I would like to see a 3rd party recording of an encrypted stream, running the released code to provide decryption. But having followed decryption from DVDs to Blueray (see doom9 forums), and knowing GSM encryption is weak and has been broken by NSA years ago, I am not in the least skeptical that this codebreaker has done it, and presented it at a very well known security conference. Tends to lend a lot of credibility to the story, IMO.

Posted by: reichwingnut at December 30, 2009 10:58 AM (tTdaQ)

72

69 "I have a cell phone. Sometimes, rarely, I even turn it on."

Cell phones can be turned on remotely. (Just like college girls.)

Now not just by local law enforcement, but by anyone who breaks your phone's encryption, can listen in to your conversations, track your locations, and even as pointed out above access your porn.

 

And bake a cake in 4 minutes!

Posted by: rightzilla at December 30, 2009 10:58 AM (rVJH4)

73 Cell phones can be turned on remotely.

Yeah, and some phones don't even have an easily removed battery (iPhone for example). That's why I have a pocket Faraday Cage. /snark?

Posted by: bonhomme at December 30, 2009 11:01 AM (jvG2F)

74

If you can store your tables in RAM (easier said that done with 2TB - but doable) you can do damn near real time solutions. A cheap cluster with some fast interconnects could do this.

Gee...thanks for clearing that up for me.

...is that code or something?

Posted by: rum, sodomy and the lash at December 30, 2009 11:02 AM (AnTyA)

75 Two terabytes isn't a terribly large number anymore

No, it isn't. 1Tb solid state drives became available earlier this year and IBM demo'd a 4Tb unit recently.

Imagine parking a van on K-street and picking up lobbyist phone calls, or outside the corporate headquarters of F500 companies prior to earnings announcements.  The possibilities for market manipulations are staggering.

Over 20 years ago I dabbled a bit with some crude tech that reads the contents of computer screens remotely after reading an article in a security journal about the theoretical possibility of doing it.  With about $70 worth of gear, I was able to read the contents of a PC's screen in a room 30' away from the receiver.  Turning off the monitor on the PC didn't even defeat it, because the video card was broadcasting so strongly itself.  The only way to beat that attack method is with expensive TEMPEST gear.

Posted by: Purple Avenger at December 30, 2009 11:03 AM (YO0c+)

76

Good God. Technology is getting to where it might as well be magic again for the average user.

Why aren't Nerds ruling the world, already?

Posted by: Rodent Liberation Front at December 30, 2009 11:03 AM (dQdrY)

77 This is not the first time GSM was “cracked”. In 2003, the method by which GSM’s encryption code could be cracked was uncovered by a team of Israeli researchers and in 2008, David Hulton and Steve Muller presented at Black Hat a technique for the successful interception and decryption of a GSM stream using $1,000 of hardware and a half hour of time. Now in 2009, we have the binary code log that could potentially make GSM decryption faster and easier than ever. Before everybody panics, it is important to point out that the GSM algorithm that was cracked was the older and less secure 64-bit A5/1 algorithm, not the newer 128-bit A5/3 algorithm. Unfortunately, GSM carriers have been slow to adopt this new 128-bit encryption standard but Nohl’s disclosure may be the kick in the butt these lazy carriers need to beef up their security.

Quoted from: Boy Genius Report

Posted by: LifeTrek at December 30, 2009 11:05 AM (tJTIW)

78 Fair enough, Jim in San Diego, and as I pointed out above, 64-bit codes have been broken by brute force attacks.

And using your source on Rainbow tables:

An easy way to improve on the "rainbowcrack" Rainbow Tables implementation

This section probably goes a bit beyond where a layman would be comfortable, but if you're interested in the practical applications of the above theory or have some interest in cryptography read on..

The rainbowcrack application is how most people come to learn about Rainbow Tables, because it is the application which puts the theory above into code. It has been very successful, with many websites dedicated to generating rainbowcrack hash tables and letting users search them.

However there is a pretty clear way this application could be improved, very easily, in the sense that the generated tables would take up a lot less disk space, but be equally as effective for breaking hashes:

Remember above that when you want to generate a certain chain you start from an arbitrary hash. This just means it doesn't matter where you choose to start from. The rainbowcrack application starts from a randomly generated 64-bit number. This number is then used to generate a chain which ultimately ends with a 128-bit hash, which is reduced to another 64-bit number.

Why use a randomly generated number as the starting point? A pseudo-random number generator can generate a fantastic amount of seemingly random numbers from a single input number. Why not make a single random input number, and then store the index of the number which generates the pseudo-random number?

So for example a cipher like RC4 is a pseudo-random number generator. Say the single input number (the "seed", as it's called) was 18092398. The first 64-bits the RC4 generates might give a number of "091358029384092", to start the chain off. The second 64-bits might give a number of "123793582983480", to start the second chain off. The third 64-bits might give "1089324083486", for the third chain, and so on potentially for billions of chains.

What is the difference between this and storing a random 64-bit number for each chain, as rainbowcrack does?

Simply that a start-point in a rainbowcrack table must be stored as the randomly generated 64-bit number. A start-point using a random-number generator needs only the single input number (the "seed") and the chain number. So when referring to the third chain in the example above, if you wanted to know the start point of "1089324083486", you would only need to know the "seed" number, and that it was the third 64-bit number generated. That's the number "18092398", and the number "3".

To know the start-point for the fourth chain you only need to know the "seed" ("18092398"), and the number "4".

If you have 2^64 chains (1,844,674,407,370,955,616) then it wouldn't make any difference, but that would be 4194304 terrabytes, far larger than any Rainbow Table ever generated. For a more realistic rainbow table with, say, 2^28 (268,435,456) chains you would only need a 28-bit number instead of storing a 64-bit number, as rainbowcrack currently does.

That's an improvement from (64-bit+64-bit) per chain to (28-bit+64-bit) per chain, plus a single 64-bit "seed" number per table. When you're talking about millions of chains that's a very significant reduction of data for the same hash-breaking ability.

In this example a rainbowcrack table would be 2^28 * ( 64-bit random start number + 64-bit chain-end number) (4096 MB).


Using a pseudo-random number generator the table would be 2^28 * ( 28-bit non-random start number + 64-bit chain-end number) + 64-bit "seed" number (3264 MB)

When you scale that difference up to the huge sizes rainbowcrack tables can reach the savings become massive, and you end up with whole hard-disk arrays of randomly-generated chain-start number data that is pure waste, not to mention the bandwidth used moving the data around.

------

So much for"two terrabytes". If the above source is accurate, it should be possible to do it with less much of the time.

Posted by: Christoph at December 30, 2009 11:05 AM (0fq7b)

79

For about $50,000 - $60,000 in hardware I could break that in real time, I think.

That would be for a 7 node cluster array, using parts I can buy all day long off the shelf.

Posted by: Jim in San Diego at December 30, 2009 11:05 AM (F09Uo)

80 Two terabytes isn't a terribly large number anymore

Quite.

Posted by: Christoph at December 30, 2009 11:06 AM (0fq7b)

81

Why aren't Nerds ruling the world, already?

Umm...helllooo...Barky?...mom jeans?...remember?

Posted by: rum, sodomy and the lash at December 30, 2009 11:06 AM (AnTyA)

82 75, rum, let me try to clear it up for you. Prior to this public release of the code to break the encryption, only really well funded organizations could hire the experts, afford the equipment and computers to do this. The bar has been substantially lowered, so anyone that can afford the equipment to record the calls (few thousand bucks) can decrypt the calls of anyone broadcasting on the public cell GSM network. They can use less than $10k of computers to decrypt the call in a trivial amount of time. Anyone in the world can now do this, including criminal gangs that could not before, with the hiring of an IT guy. There are many in the illegal cell market. Switch to CDMA.

Posted by: reichwingnut at December 30, 2009 11:07 AM (PjevJ)

83 75

If you can store your tables in RAM (easier said that done with 2TB - but doable) you can do damn near real time solutions. A cheap cluster with some fast interconnects could do this.

Gee...thanks for clearing that up for me.

...is that code or something?

Posted by: rum, sodomy and the lash at December 30, 2009 03:02 PM (AnTyA)

Hardware BABY!

I like to design cheap super computers as a hobby.

Posted by: Jim in San Diego at December 30, 2009 11:08 AM (F09Uo)

84 "Yeah, and some phones don't even have an easily removed battery (iPhone for example). That's why I have a pocket Faraday Cage. /snark?"

I rather doubt anyone other than a jealous woman would want to crack my cellphone and since I readily admit I am not monogamous, I can't see what additional information she would hope to glean.

However, cracking the local police chief's, bank president's, or mayor's cell phone could be of interest to a great many people.

Posted by: Christoph at December 30, 2009 11:08 AM (0fq7b)

85

O/T  That baby lace wigs deal off to the right can't hold a candle to these folks.  Check out the "Samuel L."


Also, the "Lace Wigs" folks have tapped into the billion dollar pet products industry...

http://tinyurl.com/yvamf6



Posted by: Cheri at December 30, 2009 11:09 AM (llSaz)

86 @ Posted by: reichwingnut at December 30, 2009 03:07 PM (PjevJ)

Very well put.

Posted by: Christoph at December 30, 2009 11:09 AM (0fq7b)

87 Given the fact that most every post HERE seems to be encrypted I worry not. Dang techies.

Posted by: rightzilla at December 30, 2009 11:11 AM (rVJH4)

88 FWIW, The FL Turnpike ships little Faraday cage bags you can slip your SunPass unit into under certain circumstances where your unit might be tempted to pay the bill for a guy close to you in line.  Those metalized bags should work fine with a cell phone.

Posted by: Purple Avenger at December 30, 2009 11:13 AM (YO0c+)

89 @86 - Crap I always screw these links up.

http://tinyurl.com/kiteezzz



Posted by: Cheri at December 30, 2009 11:13 AM (llSaz)

90 Crazy Germans. Last time they broke communication codes, Poland got it in the ass.


Of course, exile Poles returned the favor in spades with Enigma.

Posted by: IllTemperedCur at December 30, 2009 11:20 AM (l1Wlr)

91 Technology is getting to where it might as well be magic again for the average user.

It already is effectively magic...people think about this stuff like its an appliance, like a toaster.  Which is a completely distorted view. 

A toaster doesn't have much "intrinsic risk" built into it, other than maybe burning your toast or burning your house down if it malfunctions badly enough, and those "risks" are something toaster users kind of understand upfront and accept.  The toaster won't drain your bank account behind your back, assist someone in stealing your identity, or give access to confidential information that might cost millions/billions if leaked prematurely.

The "intrinsic risk" of wireless tech, is far more poorly understood by users.

Posted by: Purple Avenger at December 30, 2009 11:23 AM (YO0c+)

92

I like to design cheap super computers as a hobby.

I am cheap, but not easy.

Posted by: H.A.L. 9000 at December 30, 2009 11:26 AM (2qU2d)

93

Does anyone want any scrummy toast? How about waffles?

Posted by: Red Dwarf toaster at December 30, 2009 11:28 AM (2qU2d)

94 So this is gonna help my Qualcomm stock, right?

Posted by: chuckR at December 30, 2009 11:34 AM (zwU+W)

95
79  An easy way to improve on the "rainbowcrack" Rainbow Tables implementation

Okay, I'm not worried any more. If it were Unicorns on crack, maybe, but not rainbows on crack.

Posted by: RoadRunner at December 30, 2009 11:35 AM (VUjE6)

96 Actually, the funny part is that the biggest thing wasn't breaking the encryption (as noted before, it was already known to be weak) - it was deciphering the frequency hopping method used by the phones and base stations so that a third party could "follow" the transmissions and get a complete bitstream to decode.

Posted by: Evil Red Scandi at December 30, 2009 11:36 AM (erlfI)

97 @95 - Sadly, probably not. Qualcomm has superior technology, but the Europeans really don't like them so don't hold your breath for a switchover. Sucks too... I have some good friends that work there.

Another note - this isn't the first time GSM has been broken (GSM is an evolving standard though - today's GSM is very different from the GSM of ten years ago). CDMA, to my knowledge, has never had anyone even come close to a working attack.

Posted by: Evil Red Scandi at December 30, 2009 11:44 AM (erlfI)

98 Posted by: Evil Red Scandi at December 30, 2009 03:36 PM (erlfI) ... Great point.

Posted by: reichwingnut at December 30, 2009 11:44 AM (tTdaQ)

99 CDMA, to my knowledge, has never had anyone even come close to a working attack.

Posted by: Evil Red Scandi at December 30, 2009 03:44 PM (erlfI)

Just sayin.

Posted by: NSA at December 30, 2009 11:49 AM (dQdrY)

100 A5/1 is a crap cipher; this fact has been known for years. Using LFSRs for a stream cipher is prone to weakness. Really all that's happened is the price of commodity hardware has dropped to the point where 3 TB of lookup tables and a dozen GPUs is a feasible investment for a hacker. I assume that entities the size of governments have been able to decrypt GSM in real time for years (besides, tapping the land line portion where it comes out of the base station obviates any need for decryption.) If you want real voice security, use VOIP over a VPN.

Posted by: David Gillies at December 30, 2009 12:13 PM (2FZO3)

101 Awww frak.  Now I gotta go knock the dust of all of those comm books from grad school.  dammit.

Posted by: tangonine at December 30, 2009 12:22 PM (C8Pcc)

102 14

Ace or someone needs to do a post about this

http://tiny.cc/Rkx2N

Some kid got grounded because of his sister and posts scans of her diary on facebook, complete with guys she wants to bang who then go on to write comments on it ridiculing her.

TEH FUNNY!

His response to sister 'I ¢¾ facebook like you ¢¾ cock'

Posted by: Schwalbe at December 30, 2009 12:33 PM (UU0OF)

103 I think Kratos has something pithy to say about this.

Posted by: torabora at December 30, 2009 12:50 PM (yGQ/+)

104 Why aren't Nerds ruling the world, already? Too busy thinking about computers and sex.

Posted by: joncelli at December 30, 2009 01:29 PM (Ko4Av)

105 This story actually hit the tech blogs about a month ago, maybe early December. As Nohl points out, this is a 15 year old bug that hasn't been squashed. Why not?

The A5/1 cracking project: http://reflextor.com/trac/a51
The 26C3 conference page http://events.ccc.de/congress/2009/Fahrplan/events/3654.en.html

Money quote from the conference paper:

From the total lack of network to handset authentication, to the "Of course I'll give you my IMSI" message, to the iPhone that
really wanted to talk to us. It all came as a surprise – stunning to see what $1500 of USRP can do. Add a weak cipher trivially breakable after a few months of distributed table generation and you get the most widely deployed privacy threat on the planet.

Posted by: I R A Darth Aggie at December 30, 2009 02:20 PM (BDH94)

106 "When you scale that difference up to the huge sizes rainbowcrack tables can reach the savings become massive, and you end up with whole hard-disk arrays of randomly-generated chain-start number data that is pure waste, not to mention the bandwidth used moving the data around." Looking at it from an esoteric math solution - yes - your box would be huge, and almost real time... However from an electronic point of view, there is a little chip, available from half the chip makers on the planet, (or one in every phone), that does the same thing. The seed is sent at the beginning of each phone call, so both ends can sync. All you need to do to receive that seed, is change the electronic serial number (ESN) in the phone, and voila cloned phone. the trick is the right ESN. Feeding your box, with only a single signal is gonna be a problem, and you're gonna be listening to a whole lot of conversations at once. Been done (see batman, and ethical boundaries in your local wiki.) Scanning or reading an ESN and seed only occur once during the beginning of the call. (And changing an ESN can be done rather quickly. ) And reverse engineering anything isn't illegal, or we'd have to close all the colleges. It may violate a use agreement, but the hash code for DVD's has been published, put on T shirts, and trounced throughly in court. It's illegal to do it, not to think about it and publish the results.

Posted by: +l33t at December 30, 2009 02:35 PM (+Z5RN)

107 Just a suggestion, do not talk about bank account numbers and such with your cell phone.  Also, more info in pdf format here  http://tinyurl.com/yeel2rr

Posted by: sirsurfalot at December 30, 2009 04:22 PM (UPNlB)

108

Couple references to 64 bit encryption.  That is incorrect, the algorithm assumes the top bits to be all zeros, making this a 40 bit key.  All cryptography assumes that the algorithm is in the public domain and relies on key strength to protect the data.  This "hacker" released the algorithm, which has probably been available in the hacking community for years anyway.

40 bits keys are breakable by brute force in minutes on a standard PC.

Posted by: Dave_in_Fla at December 30, 2009 05:41 PM (NaJ/S)

109 Two terabytes isn't a terribly large number anymore

Our politicians feel the same about two teradollars ($2 trillion).


Posted by: mikey at December 31, 2009 09:33 AM (GSeVd)

Hide Comments | Add Comment | Refresh | Top

Comments are disabled. Post is locked.
132kb generated in CPU 0.0393, elapsed 0.2345 seconds.
64 queries taking 0.2078 seconds, 237 records returned.
Powered by Minx 1.1.6c-pink.