Intercepting and decrypting 2G GSM


At the Chaos Computer Club meeting in Berlin, Karsten Nohl and Sylvain Munaut demonstrated how to intercept 2G GSM calls and decrypt the contents of calls nd text messages. This is the latest in a series of attacks of the now 20 year old cryptographic system used in 2G network to protect calls.

This is a concern as mobiles are increasingly used to perform financial transactions by using text messages as a secure path to send authentication tokens. More information on this is available at Ars Technica and Bruce Schneier’s Blog.

Advertisements

One Response to Intercepting and decrypting 2G GSM

  1. Useful info. Fortunate me I found your website accidentally, and I am surprised why this accident didn’t came about in advance!
    I bookmarked it.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: