X
Home & Office

Expert eyes mobile app for GSM security

update Users should be warned when encryption is turned off or alerted of "other suspicious activity" at base stations, says security expert at Symbian Foundation.
Written by Vivian Yeo, Contributor

update A security expert is calling for the creation of a mobile app to alert users when their communications security has been compromised.

Craig Heath, chief security technologist at the Symbian Foundation, threw up the idea in a blog post Monday, noting that the security tool would serve up a warning dialog when encryption is turned off, or when "other suspicious activity" originating from base stations is detected.

Mobile phones, he said, currently are able to identify what encryption algorithm is being used between the base station and the device. For example, the Sony Ericsson P1i displays a triangle icon as warning when the base station switches to A5/0, which according to the GSM Security Web site, utilizes no encryption. GSM Security is a service provided by U.S.-based Network System Architects.

At press time, Sony Ericsson was unable to confirm Heath's remarks about P1i or whether its other phones were capable of displaying the security alert.

Heath's blog post was in response to German computer engineer Karsten Nohl's revelation last week that he had cracked the GSM (Global System for Mobile communications) algorithm, which encrypts 80 percent of the world's mobile calls.

Statistics from the GSM Association (GSMA) indicate that, as of the second quarter of 2009, there were over 4.3 billion mobile connections globally. GSM connections accounted for 3.5 billion connections.

Nohl, in his presentation at the Chaos Communication Congress in Berlin last week, detailed the efforts that went into decrypting the A5/1 algorithm. The 28-year-old concluded that GSM security "must be overhauled" with a mandatory security patch to upgrade the GSM encryption function.

Noting that Nohl's point was "a very valid one", U.K.-based Heath said cryptographic protocols ought to be designed such that different algorithms could be tapped should the need arises.

"Happily, this is the case for the GSM protocols and all that is needed is for the phone manufacturers and network operators to deploy the stronger A5/3 algorithm, and we can all go about our business," he said in his blog post.

However, Nohl noted in his presentation that replacing A5/1 with A5/3 algorithm might not be adequate for two reasons: the A5/3 cipher Kasumi is academically broken, and the same keys are used in A5/1 and A5/3.

Industry slow to react
According to Graham Titterington, principal analyst at Ovum, this is not the first time the A5/1 encryption has been cracked. He told ZDNet Asia in an e-mail that Nohl's technique is unlikely to be widely used, but said this development would spur the industry to eventually adopt stronger encryption.

"The mobile phone network has never been secure as there is no standard requiring encryption of traffic on the wired section of the network, between the carrier and the base transmitter. [There's a standard requirement] only on the wireless leg of the journey," Titterington said, adding that tapping traffic over the wired network was physically more difficult but still possible.

"The reality is that most mobile traffic isn't worth intercepting," he said. "People with sensitive data should overlay their own encryption on the transfer.

"I expect that the industry will eventually move to a stronger encryption algorithm, but it is hard to change when there is such a large investment in existing technology. The industry has been aware of the potential problem for at least 11 years, so don't expect rapid action."

A spokesperson from Singapore mobile operator, StarHub, said in an e-mail response to ZDNet Asia it was aware of reports that the GSM encryption has been cracked.

"As a GSMA member, we will of course be guided by what the GSMA recommends, and review and change our security protocols accordingly," he said.

Editorial standards