By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Notification
Latest News
OpenAI may use Associated Press archive for AI training
July 14, 2023
EU users can hold conversations with Google Bard from training set
July 14, 2023
Aptos, the new default font for Microsoft Office
July 14, 2023
BlackLotus UEFI bootkit sources published on GitHub
July 14, 2023
Hackers from the XDSpy cyber-espionage group attacked Russian organizations on behalf of the Ministry of Emergency Situations
July 14, 2023
Aa
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Reading: Encryption algorithms for 2G networks have been intentionally weakened
Share
Security Parrot - Cyber Security News, Insights and ReviewsSecurity Parrot - Cyber Security News, Insights and Reviews
Aa
Search
  • News
  • Tutorials
  • Security InsiderComing Soon
  • Expert InsightComing Soon
Follow US
Security Parrot - Cyber Security News, Insights and Reviews > News > Encryption algorithms for 2G networks have been intentionally weakened
News

Encryption algorithms for 2G networks have been intentionally weakened

Last updated: 2021/06/21 at 2:52 PM
Jim Koohyar Biniyaz Published June 21, 2021
Share
SHARE

A group of scientists from several European universities published a report that many information security experts and the media have already called sensational. The fact is that according to this study, two old encryption algorithms, created in the 1990s and 2000s, but still used in mobile networks, are vulnerable and allow users to monitor Internet traffic. First of all, we are talking about the GEA-1 algorithm, which was created and used many years ago, when the GPRS standards in 2G networks were adopted.

Even worse, the researchers write that the likelihood of such a vulnerability accidentally occurring is extremely small. That is, scientists suggested that the algorithm was deliberately weakened in order to provide law enforcement agencies with a “loophole” and comply with laws restricting the export of reliable encryption tools. After the publication of the document, the developers of the algorithm confirmed this theory.

“According to our experimental analysis, guessing six winning numbers in the German lottery twice in a row is about as likely as accidentally getting these key properties,” writes one of the report’s authors, Christoph Beierle of the Ruhr University in Bochum, Germany.

The researchers explain that two old encryption algorithms, GEA-1 and GEA-2, fell into their hands at once, which are proprietary, that is, usually inaccessible to the general public and outsiders. After examining them, experts came to the conclusion that the algorithms are vulnerable to attacks that can decrypt all user traffic.

To reverse GEA-1, in fact, scientists had to create a similar encryption algorithm themselves, using a random number generator often used in cryptography. Even so, they were unable to create the same weak encryption scheme as in the original.

“After a million tries, we don’t even come close to such a weak sample [as the original]. This means that the weakness in GEA-1 was unlikely to be an accident, meaning the 40-bit security level was driven by export regulations, the document says. “Because of these political demands, millions of users seem to have been poorly protected while surfing [the web] for many years.”

The problem with GEA-1, developed back in 1998, is that it only provides 40-bit protection. According to the researchers, this allows an attacker who can intercept traffic, recreate the key, and decrypt all data.

The representative of the European Telecommunications Standards Institute ( ETSI ), which developed the GEA-1 algorithm, admitted in an interview with Vice Motherboard that the algorithm does have weaknesses, and this was done intentionally:

“We followed the rules: We followed the export control rules that limited the capabilities of GEA-1.”

At the same time, the “descendant” of GEA-1 – GEA-2, no longer had such glaring problems. In fact, an ETSI spokesman explained that at the time of the creation of the GEA-2, export control rules had already been relaxed. However, the researchers were able to decrypt traffic protected by GEA-2 using a more sophisticated attack, and concluded that GEA-2 also “does not provide sufficient security for today’s standards.”

We can only console ourselves with the fact that at present GEA-1 and GEA-2 are not very widespread, since new standards for 3G and 4G networks have long been adopted. In 2013, ETSI completely  banned  operators from using the GEA-1 algorithm, but the researchers write that, despite this, GEA-1 and GEA-2 are used to this day, because GPRS is still used as a backup communication option in many countries. and networks.

“In most countries, [the risk] is not very high and is significantly lower than in the early 2000s, as GEA-3 and GEA-4 are in use today. But the phones still support GEA-1. There are scenarios where a mobile phone can be tricked into using the GEA-1 even today, ”says co-author Howard Ruddum.

To prove these words, experts have tested several modern smartphones based on Android and iOS to see if they can support old and vulnerable algorithms. Alas, the experiment showed that GEA-1 and GEA-2 are still supported. It is also worth adding that many IoT devices also still use 2G modems and can also be vulnerable.

Weekly Updates For Our Loyal Readers!

Jim Koohyar Biniyaz June 21, 2021
Share this Article
Facebook Twitter Email Copy Link Print

Archives

  • July 2023
  • June 2023
  • May 2023
  • April 2023
  • February 2023
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020

You Might Also Like

News

OpenAI may use Associated Press archive for AI training

July 14, 2023
News

EU users can hold conversations with Google Bard from training set

July 14, 2023
News

Aptos, the new default font for Microsoft Office

July 14, 2023
News

BlackLotus UEFI bootkit sources published on GitHub

July 14, 2023

© 2022 Parrot Media Network. All Rights Reserved.

  • Home
  • Parrot Media Group
  • Privacy Policy
  • Terms and Conditions
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Zero spam, Unsubscribe at any time.

Removed from reading list

Undo
Go to mobile version
Welcome Back!

Sign in to your account

Lost your password?