A5/2 Hack Tool
It's an open secret that the privacy in GSM (Global System for Mobile communication, the standard used in 80% of the world's mobile phones) is compromised. The A5 set of ciphers it uses has been proven incapable of preventing data from being decrypted. The architecture of the standard makes it particularily vulnerable to man-in-the-middle attacks, and since all algorithms share a common key, the system is as weak as its weakest algorithm: A5/2.
The aim of this project, initiated in May 2011 and co-developed with Olivier Benjamin, was to design a concrete and turnkey implementation of a tool simulating an instant ciphertext-only attack on the A5/2 cipher, enventually allowing full GSM communication decryption. Our tool sucessfully cracks the cipher in a few seconds on a personal computer.
Available to download are the paper we redacted along with the full source code of our application that may be used under the terms of the GNU GPL v3. We also provide an online version of the Doxygen documentation and an explicit description of the Global Encoding Matrix that can be directly reused for all Steps (Fire Code, Convolution & Interleaving).