December 30, 2009
— Purple Avenger If true, this is scary, very scary, and will cost billions to resolve.
A German hacker claims to have cracked the encryption that protects most cellphone calls, potentially paving the way for others to eavesdrop on conversations.The security aspects are bad enough, but there's undoubtedly a crapload of gear out in the field that has this encryption burned into ROM's and otherwise not easily reconfigured methods.The claim, if true, could pose a threat to many wireless carriers who have used essentially the same security on their networks for years...
That's one of the constant worries with embedded encryption tech -- if its easy for YOU to upgrade/change, then its also easier for someone else to do the same. A cheap mask programmed ROM is physically incapable of being altered remotely...which is a good thing...until the time comes that the code it contained exhibits a weakness. Now you gotta physically go out into the field and start swapping ROM's in gear...unless the ROM has been soldered down, in which case, now you're swapping whole boards out...which means you have to make new boards...distribute those boards, etc, etc.
It will be interesting to see how this plays out. It may just be BS and the German is hoaxing, but if he's not, telecom companies and their customers are going to get hit with some pretty big one-time expenses fairly soon.
Posted by: Purple Avenger at
10:05 AM
| Comments (109)
Post contains 247 words, total size 2 kb.
Posted by: 'Nam Grunt at December 30, 2009 10:10 AM (nmfvn)
Be the first on your block to get the new and improved Secure Phonee technology. Just $99.99 plus activation.
It's what all the cool kids are doing. Comes in pink, too.
Posted by: Rodent Liberation Front at December 30, 2009 10:11 AM (dQdrY)
The report is distorted. What they did was to reverse engineer the encryption algorithm. That's not the same as "cracking" it.
It does open the cipher up to a brute force attack, but since it's a 64-bit key that isn't really trivial.
Posted by: Steven Den Beste at December 30, 2009 10:12 AM (+rSRq)
Posted by: Peaches at December 30, 2009 10:12 AM (9Wv2j)
sheesh, I wish he would have kept his mouth shut. This is just like the airlines, you don't need "Real" security, you just need people to THINK you've got security.
If you've got that, you've got it made. And you can explain anything that goes wrong as "'jes one a' them things can't do nothin' about."
Posted by: Janet Napolitano at December 30, 2009 10:13 AM (T1boi)
Posted by: California Red at December 30, 2009 10:13 AM (7uWb8)
Posted by: Steven Den Beste at December 30, 2009 10:14 AM (+rSRq)
O/T That baby lace wigs deal off to the right can't hold a candle to these folks. Check out the "Samuel L."
Posted by: Chefess (formerly RushBabe) at December 30, 2009 10:15 AM (LKkE8)
On the SANS site, there was a quote "the industry group that developed GSM said Nohl's actions were illegal." So there you go - it was illegal, so nobody can use it. I feel much safer already, much like I accept JaNo's assurances that the system worked and air travel is safe.
Posted by: 141 Driver at December 30, 2009 10:15 AM (JFNQ7)
Posted by: 'Nam Grunt at December 30, 2009 10:15 AM (nmfvn)
Ace or someone needs to do a post about this
Some kid got grounded because of his sister and posts scans of her diary on facebook, complete with guys she wants to bang who then go on to write comments on it ridiculing her.
Posted by: Mr. Pink at December 30, 2009 10:16 AM (SqAkN)
"I'm appalled that Republicans are 'particizing' this security issue...."
Just now on Fox. Debbie's been dippin' into the last of the egg nog.
Posted by: Intrepid at December 30, 2009 10:17 AM (92zkk)
Posted by: reichwingnut at December 30, 2009 10:17 AM (1bQOq)
Posted by: tmitsss at December 30, 2009 10:18 AM (V4Pya)
Not really off topic - The most convincing SAP Business Objects advertisement EVAH!
Makes me want to get busy doing business with my object until SAPped.
Posted by: Hussein the Plumber at December 30, 2009 10:19 AM (r1h5M)
Posted by: maddogg at December 30, 2009 10:20 AM (OlN4e)
Posted by: RoadRunner at December 30, 2009 10:20 AM (VUjE6)
Posted by: reichwingnut at December 30, 2009 10:21 AM (pIKTP)
Posted by: Hussein the Plumber at December 30, 2009 10:23 AM (r1h5M)
Posted by: Hussein the Plumber at December 30, 2009 10:26 AM (r1h5M)
Posted by: GregInSeattle at December 30, 2009 10:27 AM (B5cM9)
Posted by: rum, sodomy and the lash at December 30, 2009 10:27 AM (AnTyA)
Anybody who thinks that their cell call can't be overheard isn't dealing with a full deck.
Posted by: Neo at December 30, 2009 10:28 AM (tE8FB)
Posted by: HeatherRadish at December 30, 2009 10:30 AM (NtiET)
Posted by: rightzilla at December 30, 2009 10:30 AM (rVJH4)
... telecom companies and their customers are going to get hit with some pretty big one-time expenses fairly soon.
There! Justification for a new federal tax on ... will it be cell phone service, or DSL?
Posted by: Michael Rittenhouse at December 30, 2009 10:30 AM (2QFX4)
Posted by: 'Nam Grunt at December 30, 2009 10:31 AM (nmfvn)
On the SANS site, there was a quote "the industry group that developed GSM said Nohl's actions were illegal." So there you go - it was illegal, so nobody can use it. I feel much safer already, much like I accept JaNo's assurances that the system worked and air travel is safe.
Posted by: 141 Driver at December 30, 2009 02:15 PM (JFNQ7)
The lamer the refutation, the more serious the problem.
"It's ILLEGAL!" I'd be embarrassed to say something that stupid and if that's the best they cam come up with then potentially this is a huge problem.
Posted by: Jim in San Diego at December 30, 2009 10:31 AM (F09Uo)
Posted by: reichwingnut at December 30, 2009 10:31 AM (5ddCw)
Privacy is of great concern to me. That's I only speak near extinct native american languages on cell phone calls.
Yah-ze muthaf*ckaz!
Posted by: Dirk Diggler at December 30, 2009 10:33 AM (2EbLc)
OT
Dammit Texas Tech (I got my engineering degree there) has fired Mike Leach. The best football coach they ever had.
Posted by: maddogg at December 30, 2009 10:33 AM (OlN4e)
Posted by: 'Nam Grunt at December 30, 2009 10:35 AM (nmfvn)
Or your local mobbed up criminal who does phone cloning...
Having crypto reprogramming tech distributed at thousands and thousands of locations, staffed by thousands and thousands of random joyously happy employees, all of who undoubtedly are of the utmost sterling character and would never think of doing anything even remotely criminal, sounds completely risk free to me. What could possibly go wrong?
Posted by: Purple Avenger at December 30, 2009 10:36 AM (YO0c+)
Posted by: 'Nam Grunt at December 30, 2009 10:36 AM (nmfvn)
Caller 1: What are you up to?
Caller2: Nothing, how about you?
Caller 1: Nothing. I'll call you back.
Caller 2: Or I'll call you.
absolutely no one should care about the loss of encryption.
Posted by: dfbaskwill at December 30, 2009 10:37 AM (7Gs5S)
Wait..what the fuck.?? I have this (AnTyA) attached to every comment
Ace, you facist, Nazi fuck...are you tracking me?
Posted by: rum, sodomy and the lash at December 30, 2009 10:37 AM (AnTyA)
Posted by: Purple Avenger at December 30, 2009 10:38 AM (YO0c+)
Posted by: nickless at December 30, 2009 10:41 AM (MMC8r)
So some kraut is going to know I'm picking up a gallon of milk and some Eggos® for my wife on the way home from work.
Why are my nuts still all loosy-goosy over this?
Posted by: Dang at December 30, 2009 10:42 AM (UA4gE)
They're not interested in that. They're interested in jacking your ID and using it to ring up thousands of dollars in calls that will appear on your bill.
Posted by: Purple Avenger at December 30, 2009 10:43 AM (YO0c+)
Posted by: Mallamutt at December 30, 2009 10:43 AM (hKyl0)
Same here. I prolly use the alarm feature more than anything else. I just never warmed up to them. Nice to have in an emergency, tho.
Posted by: Soap MacTavish at December 30, 2009 10:44 AM (554T5)
Posted by: Mallamutt at December 30, 2009 10:45 AM (hKyl0)
They're not interested in that. They're interested in jacking your ID and using it to ring up thousands of dollars in calls that will appear on your bill
Yesssss...I'm covered.... unlimited calling plan...woo hoo
Posted by: rum, sodomy and the lash at December 30, 2009 10:47 AM (AnTyA)
Posted by: CDR M at December 30, 2009 10:47 AM (cvmTR)
Posted by: 'Nam Grunt at December 30, 2009 10:48 AM (nmfvn)
The encryption algorithm was already known to be weak, and a replacement has been devised (years ago) and is built into the vast majority of cell phones and base stations. They're not using it now because the carriers haven't wanted to hassle it.
The attack should be very practical in a few months - it requires about two terabytes of rainbow tables to allow for near-real-time decryption. Two terabytes isn't a terribly large number anymore, and the rainbow tables have been under construction for quite a long time now.
Posted by: Evil Red Scandi at December 30, 2009 10:48 AM (erlfI)
39 That's why you can get a firmware upgrade for your phone at the phone store
I would rather get a FIREARM upgrade to take care of the sitcheeeeation!
Posted by: rightzilla at December 30, 2009 10:48 AM (rVJH4)
Posted by: rightzilla at December 30, 2009 10:50 AM (rVJH4)
Posted by: german hacker at December 30, 2009 10:51 AM (rVJH4)
it requires about two terabytes of rainbow tables to allow for near-real-time decryption
Seriously...WTF are you talking about??
...seriously
Posted by: rum, sodomy and the lash at December 30, 2009 10:51 AM (AnTyA)
If they hacked odumbass phone all they would hear is present.
And uh, ummm, uh, yes Michelle.....................
Posted by: Mallamutt at December 30, 2009 10:52 AM (hKyl0)
Really?
Why do banks use 256-bit encryption and on up?
Which is not 4 times stronger, it's a whole lot stronger.
Finally, 64-bit keys have been broken before by brute force attacks. Nothing higher than 64-bit thus far, but 64? Yeah.
Posted by: Christoph at December 30, 2009 10:52 AM (0fq7b)
Posted by: 'Nam Grunt at December 30, 2009 10:54 AM (nmfvn)
Posted by: reichwingnut at December 30, 2009 10:54 AM (Scxfk)
Posted by: nickless at December 30, 2009 10:54 AM (MMC8r)
Posted by: Dr. Spank at December 30, 2009 10:55 AM (muUqs)
Posted by: Hugo Black and William O. Douglas at December 30, 2009 10:55 AM (rVJH4)
I vas listening in on Ace..
...vat means "I tossed his salad and then he dorked me up the squeakhole"?
Posted by: Another German Hacker at December 30, 2009 10:56 AM (AnTyA)
Posted by: di butler at December 30, 2009 10:57 AM (S3xX1)
Cell phones can be turned on remotely. (Just like college girls.)
Now not just by local law enforcement, but by anyone who breaks your phone's encryption, can listen in to your conversations, track your locations, and even as pointed out above access your porn.
Posted by: Christoph at December 30, 2009 10:57 AM (0fq7b)
it requires about two terabytes of rainbow tables to allow for near-real-time decryption
Seriously...WTF are you talking about??
...seriously
Posted by: rum, sodomy and the lash at December 30, 2009 02:51 PM (AnTyA)
Rainbow Tables http://tiny.cc/G5Qry
If you can store your tables in RAM (easier said that done with 2TB - but doable) you can do damn near real time solutions. A cheap cluster with some fast interconnects could do this.
Posted by: Jim in San Diego at December 30, 2009 10:58 AM (F09Uo)
Posted by: reichwingnut at December 30, 2009 10:58 AM (tTdaQ)
69 "I have a cell phone. Sometimes, rarely, I even turn it on."
Cell phones can be turned on remotely. (Just like college girls.)
Now not just by local law enforcement, but by anyone who breaks your phone's encryption, can listen in to your conversations, track your locations, and even as pointed out above access your porn.
And bake a cake in 4 minutes!
Posted by: rightzilla at December 30, 2009 10:58 AM (rVJH4)
Yeah, and some phones don't even have an easily removed battery (iPhone for example). That's why I have a pocket Faraday Cage. /snark?
Posted by: bonhomme at December 30, 2009 11:01 AM (jvG2F)
If you can store your tables in RAM (easier said that done with 2TB - but doable) you can do damn near real time solutions. A cheap cluster with some fast interconnects could do this.
Gee...thanks for clearing that up for me.
...is that code or something?
Posted by: rum, sodomy and the lash at December 30, 2009 11:02 AM (AnTyA)
No, it isn't. 1Tb solid state drives became available earlier this year and IBM demo'd a 4Tb unit recently.
Imagine parking a van on K-street and picking up lobbyist phone calls, or outside the corporate headquarters of F500 companies prior to earnings announcements. The possibilities for market manipulations are staggering.
Over 20 years ago I dabbled a bit with some crude tech that reads the contents of computer screens remotely after reading an article in a security journal about the theoretical possibility of doing it. With about $70 worth of gear, I was able to read the contents of a PC's screen in a room 30' away from the receiver. Turning off the monitor on the PC didn't even defeat it, because the video card was broadcasting so strongly itself. The only way to beat that attack method is with expensive TEMPEST gear.
Posted by: Purple Avenger at December 30, 2009 11:03 AM (YO0c+)
Good God. Technology is getting to where it might as well be magic again for the average user.
Why aren't Nerds ruling the world, already?
Posted by: Rodent Liberation Front at December 30, 2009 11:03 AM (dQdrY)
Quoted from: Boy Genius Report
Posted by: LifeTrek at December 30, 2009 11:05 AM (tJTIW)
And using your source on Rainbow tables:
An easy way to improve on the "rainbowcrack" Rainbow Tables implementation
This section probably goes a bit beyond where a layman would be comfortable, but if you're interested in the practical applications of the above theory or have some interest in cryptography read on..
The rainbowcrack application is how most people come to learn about Rainbow Tables, because it is the application which puts the theory above into code. It has been very successful, with many websites dedicated to generating rainbowcrack hash tables and letting users search them.
However there is a pretty clear way this application could be improved, very easily, in the sense that the generated tables would take up a lot less disk space, but be equally as effective for breaking hashes:
Remember above that when you want to generate a certain chain you start from an arbitrary hash. This just means it doesn't matter where you choose to start from. The rainbowcrack application starts from a randomly generated 64-bit number. This number is then used to generate a chain which ultimately ends with a 128-bit hash, which is reduced to another 64-bit number.
Why use a randomly generated number as the starting point? A pseudo-random number generator can generate a fantastic amount of seemingly random numbers from a single input number. Why not make a single random input number, and then store the index of the number which generates the pseudo-random number?
So for example a cipher like RC4 is a pseudo-random number generator. Say the single input number (the "seed", as it's called) was 18092398. The first 64-bits the RC4 generates might give a number of "091358029384092", to start the chain off. The second 64-bits might give a number of "123793582983480", to start the second chain off. The third 64-bits might give "1089324083486", for the third chain, and so on potentially for billions of chains.
What is the difference between this and storing a random 64-bit number for each chain, as rainbowcrack does?
Simply that a start-point in a rainbowcrack table must be stored as the randomly generated 64-bit number. A start-point using a random-number generator needs only the single input number (the "seed") and the chain number. So when referring to the third chain in the example above, if you wanted to know the start point of "1089324083486", you would only need to know the "seed" number, and that it was the third 64-bit number generated. That's the number "18092398", and the number "3".
To know the start-point for the fourth chain you only need to know the "seed" ("18092398"), and the number "4".
If you have 2^64 chains (1,844,674,407,370,955,616) then it wouldn't make any difference, but that would be 4194304 terrabytes, far larger than any Rainbow Table ever generated. For a more realistic rainbow table with, say, 2^28 (268,435,456) chains you would only need a 28-bit number instead of storing a 64-bit number, as rainbowcrack currently does.
That's an improvement from (64-bit+64-bit) per chain to (28-bit+64-bit) per chain, plus a single 64-bit "seed" number per table. When you're talking about millions of chains that's a very significant reduction of data for the same hash-breaking ability.
In this example a rainbowcrack table would be 2^28 * ( 64-bit random start number + 64-bit chain-end number) (4096 MB).
Using a pseudo-random number generator the table would be 2^28 * (
28-bit non-random start number + 64-bit chain-end number) + 64-bit
"seed" number (3264 MB)
------
So much for"two terrabytes". If the above source is accurate, it should be possible to do it with less much of the time.
Posted by: Christoph at December 30, 2009 11:05 AM (0fq7b)
For about $50,000 - $60,000 in hardware I could break that in real time, I think.
That would be for a 7 node cluster array, using parts I can buy all day long off the shelf.
Posted by: Jim in San Diego at December 30, 2009 11:05 AM (F09Uo)
Posted by: reichwingnut at December 30, 2009 11:07 AM (PjevJ)
If you can store your tables in RAM (easier said that done with 2TB - but doable) you can do damn near real time solutions. A cheap cluster with some fast interconnects could do this.
Gee...thanks for clearing that up for me.
...is that code or something?
Posted by: rum, sodomy and the lash at December 30, 2009 03:02 PM (AnTyA)
Hardware BABY!
I like to design cheap super computers as a hobby.
Posted by: Jim in San Diego at December 30, 2009 11:08 AM (F09Uo)
I rather doubt anyone other than a jealous woman would want to crack my cellphone and since I readily admit I am not monogamous, I can't see what additional information she would hope to glean.
However, cracking the local police chief's, bank president's, or mayor's cell phone could be of interest to a great many people.
Posted by: Christoph at December 30, 2009 11:08 AM (0fq7b)
O/T That baby lace wigs deal off to the right can't hold a candle to these folks. Check out the "Samuel L."
Also, the "Lace Wigs" folks have tapped into the billion dollar pet products industry...
Posted by: Cheri at December 30, 2009 11:09 AM (llSaz)
Posted by: rightzilla at December 30, 2009 11:11 AM (rVJH4)
Posted by: Purple Avenger at December 30, 2009 11:13 AM (YO0c+)
Of course, exile Poles returned the favor in spades with Enigma.
Posted by: IllTemperedCur at December 30, 2009 11:20 AM (l1Wlr)
It already is effectively magic...people think about this stuff like its an appliance, like a toaster. Which is a completely distorted view.
A toaster doesn't have much "intrinsic risk" built into it, other than maybe burning your toast or burning your house down if it malfunctions badly enough, and those "risks" are something toaster users kind of understand upfront and accept. The toaster won't drain your bank account behind your back, assist someone in stealing your identity, or give access to confidential information that might cost millions/billions if leaked prematurely.
The "intrinsic risk" of wireless tech, is far more poorly understood by users.
Posted by: Purple Avenger at December 30, 2009 11:23 AM (YO0c+)
Does anyone want any scrummy toast? How about waffles?
Posted by: Red Dwarf toaster at December 30, 2009 11:28 AM (2qU2d)
Posted by: chuckR at December 30, 2009 11:34 AM (zwU+W)
79 An easy way to improve on the "rainbowcrack" Rainbow Tables implementation
Okay, I'm not worried any more. If it were Unicorns on crack, maybe, but not rainbows on crack.
Posted by: RoadRunner at December 30, 2009 11:35 AM (VUjE6)
Posted by: Evil Red Scandi at December 30, 2009 11:36 AM (erlfI)
Another note - this isn't the first time GSM has been broken (GSM is an evolving standard though - today's GSM is very different from the GSM of ten years ago). CDMA, to my knowledge, has never had anyone even come close to a working attack.
Posted by: Evil Red Scandi at December 30, 2009 11:44 AM (erlfI)
Posted by: reichwingnut at December 30, 2009 11:44 AM (tTdaQ)
Posted by: Evil Red Scandi at December 30, 2009 03:44 PM (erlfI)
Just sayin.
Posted by: NSA at December 30, 2009 11:49 AM (dQdrY)
Posted by: David Gillies at December 30, 2009 12:13 PM (2FZO3)
Posted by: tangonine at December 30, 2009 12:22 PM (C8Pcc)
Ace or someone needs to do a post about this
Some kid got grounded because of his sister and posts scans of her diary on facebook, complete with guys she wants to bang who then go on to write comments on it ridiculing her.
TEH FUNNY!
His response to sister 'I ¢¾ facebook like you ¢¾ cock'
Posted by: Schwalbe at December 30, 2009 12:33 PM (UU0OF)
Posted by: torabora at December 30, 2009 12:50 PM (yGQ/+)
Posted by: joncelli at December 30, 2009 01:29 PM (Ko4Av)
The A5/1 cracking project: http://reflextor.com/trac/a51
The 26C3 conference page http://events.ccc.de/congress/2009/Fahrplan/events/3654.en.html
Money quote from the conference paper:
From the total lack of network to handset authentication, to the "Of course I'll give you my IMSI" message, to the iPhone that really wanted to talk to us. It all came as a surprise – stunning to see what $1500 of USRP can do. Add a weak cipher trivially breakable after a few months of distributed table generation and you get the most widely deployed privacy threat on the planet.
Posted by: I R A Darth Aggie at December 30, 2009 02:20 PM (BDH94)
Posted by: +l33t at December 30, 2009 02:35 PM (+Z5RN)
Posted by: sirsurfalot at December 30, 2009 04:22 PM (UPNlB)
Couple references to 64 bit encryption. That is incorrect, the algorithm assumes the top bits to be all zeros, making this a 40 bit key. All cryptography assumes that the algorithm is in the public domain and relies on key strength to protect the data. This "hacker" released the algorithm, which has probably been available in the hacking community for years anyway.
40 bits keys are breakable by brute force in minutes on a standard PC.
Posted by: Dave_in_Fla at December 30, 2009 05:41 PM (NaJ/S)
Our politicians feel the same about two teradollars ($2 trillion).
Posted by: mikey at December 31, 2009 09:33 AM (GSeVd)
Hide Comments | Add Comment | Refresh | Top
64 queries taking 0.2078 seconds, 237 records returned.
Powered by Minx 1.1.6c-pink.








Posted by: lorien1973 at December 30, 2009 10:08 AM (IhQuA)