3 GSM Cellular Crypto Code Breaking
By Kumar Gaurav,B.Tech(E.C.E),New Delhi.
Most people think that “hackers” are just a bunch of criminals. But those of us who are real hackers know better. We know that to be a true hacker, you must dare to discover new things, and have the moral strength to turn your knowledge to good.
In this brief Guide we give an example of how real hackers are working to reveal to the world how to crack open the technique that is supposed to provide privacy to GSM (Global System for Mobile communications) cell phone calls.
Why would anyone want to ruin the privacy of GSM cell phone calls? The problem is that this privacy has already been ruined by those who already know how to crack this code, for example spy agencies. Who knows, perhaps crime organizations also are able to snoop on GSM phone calls. This is a big deal because over three million people are using GSM phone and they don't realize they could be snooped upon.
Enter hackers – specifically, a group led by a member of one of the oldest hacker groups around, Germany's Chaos Computer Club.Karsten Nohl, now chief research scientist withH4RDW4RE, a Sunnyvale, Calif.-based security research firm.
Download slides here.
See Nohl's article, Reverse-Engineering a Cryptographic RFID Tag
Make a Karsten Nohl lecture your new ringtone.
0 comments