[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: Newt's phone calls




Asgaard <[email protected]> writes:
> On Sun, 12 Jan 1997, Adam Back wrote:
> 
> >[...]  Anyone know how modular the design is, for instance if
> >it would be possible to give a GSM A5 based cell phone a crypto upgrade
> >using published electrical interface standards?  (I want one of those -
> >Nokia phone with IDEA + 2048 bit RSA signatures + DH forward secrecy!)
> 
> I don't understand what you are getting at here.
> This would demand cooperation from the cell phone provider,
> with a compatible device at the other end of the airwaves.

If you super-encrypted the IDEA encrypted traffic with A5, it should
not require cooperation of the cell phone provider.  You always need a
capable device at the other end.  If the phone at the other end isn't
IDEA/RSA/DH capable, you can fall back to only A5.

My question about electrical interfaces was wondering if the above
could be acheived by producing a plugable mini-smartcard, or
desolderable IC which would allow this to be done with standard GSM
phones.

> Then the call would go unencrypted through much of the
> system until it reached the callee's current cell sender
> anyway. GSM is alledgedly A5 encrypted only in the air.
> 
> And if A5 is a 'decent' algorithm or not is up to discussion.
> It hasn't been up on the list for a long time now but from
> earlier discussions I remember that the latest versions of
> A5, if not 'strong' in a crypto anarchy sense, are susceptible
> to attack only from very sophisticated adversaries and certainly
> not from Newt's 'couple'.

Not from Newt's eavesdroppers sure, but it wouldn't cost that much for
someone who wanted the traffic.  40 bits of effective key space at
most,

Adam
--
print pack"C*",split/\D+/,`echo "16iII*o\U@{$/=$z;[(pop,pop,unpack"H*",<>
)]}\EsMsKsN0[lN*1lK[d2%Sa2/d0<X+d*lMLa^*lN%0]dsXx++lMlN/dsM0<J]dsJxp"|dc`