[2502] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: TIME Magazine on GSM cell phone crack

daemon@ATHENA.MIT.EDU (Andreas Bogk)
Tue Apr 14 12:16:48 1998

To: Bill Frantz <frantz@netcom.com>
Cc: marc@cryptsoft.com, Steve Bellovin <smb@research.att.com>,
        Marc Horowitz <marc@cygnus.com>, Declan McCullagh <declan@well.com>,
        cryptography@c2.net
From: Andreas Bogk <andreas@artcom.de>
Date: 14 Apr 1998 17:09:40 +0200
In-Reply-To: Bill Frantz's message of "Mon, 13 Apr 1998 21:51:49 -0800"

Bill Frantz <frantz@netcom.com> writes:

> My question is how many challenge/response pairs are needed to pare the
> keysize down enough to make brute force a reasonable attack?

You get the key bits in chunks of 16 bits each, and you need about
20000 challenge/response pairs for each chunk.

Andreas

-- 
The obvious mathematical breakthrough [to break modern encryption]
would be development of an easy way to factor large prime numbers.

	-- Bill Gates from "The Road Ahead," p. 265.

home help back first fref pref prev next nref lref last post