A team of cryptanalysits presents the first publicly available cryptanalytic attacks on the GEA-1 and GEA-2 algorithms. Instead of providing full 64-bit security, they show that the initial state of GEA-1 can be recovered from as little as 65 bits of known keystream (with at least 24 bits coming from one frame) in time 240 GEA-1 evaluations and using 44.5 GiB of memory. The attack on GEA-1 is based on an exceptional interaction of the deployed LFSRs and the key initialization, which is highly unlikely to occur by chance. This unusual pattern indicates that the weakness is intentionally hidden to limit the security level to 40 bit by design. Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2 Music composed by Toby Fox and performed by Sean Schafianski.Special Guests: Gaëtan Leurent and Håvard Raddum.
AI Summary coming soon
Sign up to get notified when the full AI-powered summary is ready.
Free forever for up to 3 podcasts. No credit card required.
Episode 24: CryptoHack's Collection of Cryptic Conundrums!
Episode 23: Psychic Signatures in Java!
Episode 22: Three Lessons from Threema: Breaking a Secure Messenger!
Episode 21: Proving Fundamental Equivalencies in Isogeny Mathematics!
Free AI-powered recaps of Cryptography FM and your other favorite podcasts, delivered to your inbox.
Free forever for up to 3 podcasts. No credit card required.