AndersonAttack@Home/en

Aus BC-Wiki
Zur Navigation springen Zur Suche springen
The purpose of the project is to implement Anderson's attack on A5/1 GSM stream cipher. The attack's idea was described in the early 90's in a mailing group. As we know, it was never implemented in practice before. Anderson's attack belongs to a class of brute-force attacks, so given enough time it extracts a secret key with 100% probability, in contrast to the most popular rainbow tables attack on A5/1, that have success probability around 90%.

It should be noted, that currently we have an application only for CUDA GPU with compute capability 2.0 and higher. To prevent possible errors GPU drivers should be updated.

AndersonAttack@home was founded by Matrosov Institute for System Dynamics and Control Theory of Siberian Branch of Russian Academy of Science, laboratory of Discrete Analysis and Applied Logic and by A.A. Kharkevich Institute for Information Transmission Problems, center of distributed computing.

AndersonAttack@Home
Start November 2016
End Autumn 2017
Status finished
Admin TestUser1
Institution Matrosov Institute
Country Russia
Area Mathematics
Apps
Win
Linux
Mac
64bit
PS3
ATI
CUDA Cryptanalysis of the stream cipher A5/1 by the Anderson attack 0.04/0.03 [win/linux]
Intel
Android
RPi
NCI
System-Specs
VRAM SP DP
RAM
Runtime
HDD
Traffic dl/ul
Deadline
Checkpoints