The A5/1 privacy algorithm – more commonly known as the GSM algorithm – has been cracked and published by Karsten Nohl, a German encryption expert. He says his intention is to raise awareness about the vulnerability of the security mechanism that has been put in place 21 years ago and is still being used by 80 percent of all mobile phones.
The New York Times reports that the code book has been published by Nohl using BitTorrent and similar services. He shied away from publishing it on a website and providing a link to the public because of the possibility of being sued and/or persecuted. He previously announced his plan to crack the GSM encryption at the HAR conference in August.
The G.S.M. Association is, of course, not satisfied with this development, although they are of the opinion that the issue doesn’t deserve the alarmist titles it got in the media. “This is theoretically possible but practically unlikely,” said their spokeswoman.
The encryption key isn’t the only thing that you have to have to gain access to other people’s phone conversations. You also need the specific hardware and software to identify the particular call from the other thousands that are transmitted through the same cellphone station, and that is no easy feat since during the conversation the digital call switches between 60 broadcast frequencies.
And also, there is another very simple solution that can resolve this issue for the time being: the network operators could switch to the A5/3 algorithm (the 128-bit successor of the current 64-bit A5/) that has been developed in 2007 and is today used on third-generation networks.