📖 WIPIVERSE

🔍 Currently registered entries: 75,544건

A5 (classification)

A5 is a series of stream cipher algorithms used to encrypt mobile (cellular) voice and data communications. Primarily, it is deployed in the Global System for Mobile communications (GSM) standard. Due to security vulnerabilities discovered over time, it has largely been replaced by more secure algorithms, though it may still be encountered in older GSM networks.

The A5 family includes several variations, notably:

  • A5/1: A stream cipher used for encrypting voice communications in most GSM networks. It was initially kept secret but was leaked in 1999 and subsequently cracked. It's considered weak and vulnerable to various attacks, including known-plaintext attacks and time-memory trade-off attacks.

  • A5/2: A weaker variant of A5/1, intentionally weakened for export to countries outside of the COCOM agreement (Coordinating Committee for Multilateral Export Controls). Its weakened nature made it even more vulnerable than A5/1.

  • A5/3: Also known as KASUMI, is a block cipher used in 3G (UMTS) and later GSM standards for confidentiality. It is considered more secure than A5/1 and A5/2.

  • A5/4: A stream cipher based on the SNOW 3G algorithm. It also provides confidentiality in 3G and later GSM standards.

  • A5/5: An alternative to A5/1 that was proposed but never deployed.

  • A5/6: A further evolution in the A5 series, but details are limited and deployment information is scarce.

  • A5/7: Another variation that saw little to no actual implementation.

  • A5/8: Utilized with GPRS (General Packet Radio Service) and EDGE (Enhanced Data rates for GSM Evolution) for data encryption.

The initial secrecy surrounding the A5 algorithms, particularly A5/1, hindered independent security analysis. The subsequent leaks and successful attacks on these algorithms highlighted the importance of open cryptographic design and rigorous evaluation by the security community. The vulnerabilities in A5/1 and A5/2 served as a catalyst for the development and adoption of stronger encryption standards in mobile communications. The shift toward A5/3 (KASUMI) and A5/4 demonstrates the ongoing effort to improve security against eavesdropping and unauthorized access to mobile communications.