Thesis (Selection of subject)Thesis (Selection of subject)(version: 390)
Thesis details
   Login via CAS
Cryptanalysis of ciphers used in GSM phones
Thesis title in Czech: Kryptoanalýza šifer používaných v GSM telefonech
Thesis title in English: Cryptanalysis of ciphers used in GSM phones
Key words: A5/1, kryptoanalýza v reálném čase, Galton-Watson proces, vícetypový Galton-Watson proces, makro proces
English key words: A5/1, real time cryptanalysis, singletype Galton-Watson process, multitype Galton-Watson process, macro process
Academic year of topic announcement: 2011/2012
Thesis type: diploma thesis
Thesis language: angličtina
Department: Department of Algebra (32-KA)
Supervisor: doc. RNDr. Jiří Tůma, DrSc.
Author: hidden - assigned and confirmed by the Study Dept.
Date of registration: 26.06.2012
Date of assignment: 26.06.2012
Confirmed by Study dept. on: 27.07.2012
Date and time of defence: 20.09.2012 00:00
Date of electronic submission:02.08.2012
Date of submission of printed version:03.08.2012
Date of proceeded defence: 20.09.2012
Opponents: RNDr. Marian Kechlibar, Ph.D.
 
 
 
Guidelines
To collect the description of ciphers used in GSM phones. To study published attacks on these ciphers. To investigate possibilities and problems of implementing these ciphers. To study some theoretical questions connected to these attacks.

References
A.Biryukov, A.Shamir, D.Wagner, "Real-Time Cryptanalysis of A5/1 on a PC", http://www.wisdom.weizmann.ac.il/~albi/publications.html

A.Biryukov, A.Shamir, "Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers", http://www.wisdom.weizmann.ac.il/~albi/publications.html

David Wagner, "The boomerang attack", www.cs.berkeley.edu/~daw/papers/boomerang-fse99.ps

Orr Dunkelman, Nathan Keller, and Adi Shamir, "A Practical-Time Attack on the A5/3
Cryptosystem Used in Third Generation GSM Telephony", http://eprint.iacr.org/2010/013.pdf

 
Charles University | Information system of Charles University | http://www.cuni.cz/UKEN-329.html