Research Article

A New Guess-and-Determine Method for Cryptanalysis of the GSM Encryption

Table 3

Comparison of related attacks (PW: precomputation workload; CC: computational complexity).

AttackPWCCKnown keystreamSuccess probability (%)Memory requirementTime to recover key

Proposed in [12]220.8 bits6364 GBImpractical attack
Biased birthday attack 1 [14]1 second bits60146 GBImpractical attack
Biased birthday attack 2 [14]1 second bits60292 GBImpractical attack
Subgraph attack [14]3–6 minutes bits60146 GBImpractical attack
Proposed in [15]0251.24Only 64 bits1807 hours
Proposed in [20]0254.04Only 64 bits10007 hours
Proposed in [4]NANAOnly 64 bits81984 GB9 seconds
Proposed in [5]NANAOnly 64 bits80.083.84 TB33 seconds
Proposed in this paper0252Only 64 bits96.664 GB12 seconds

Large amount of keystream requirements makes first four attacks impractical; needing of lot of precomputation data is also a big obstacle in practicality of these four attacks.