Flaw in Cell-Phone Encryption Identified; Design Process Blamedwriting

militaryeducationsurveillancecivil-libertiesprivacycryptographylibrariestelecommunicationsrrelawforwarded-contentgovernment-infoauto-importedrre-postadministrative
1997-03-20 · 4 min read · Edit on Pyrite

Source

Automatically imported from: http://commons.somewhere.com:80/rre/1997/Flaw.in.Cell-Phone.Encry.html

Content

This web service brought to you by Somewhere.Com, LLC.

Flaw in Cell-Phone Encryption Identified; Design Process Blamed

``` [This is just incredible.]

---

This message was forwarded through the Red Rock Eater News Service (RRE). Send any replies to the original author, listed in the From: field below. You are welcome to send the message along to others but please do not use the "redirect" command. For information on RRE, including instructions for (un)subscribing, send an empty message to rre-help@weber.ucsd.edu

---

Date: Thu, 20 Mar 1997 13:31:21 -0800 (PST) From: risks@csl.sri.com Subject: RISKS DIGEST 18.92

RISKS-LIST: Risks-Forum Digest Thursday 20 March 1997 Volume 18 : Issue 92

---

Date: Thu, 20 Mar 1997 12:35:16 PST From: "Peter G. Neumann" Subject: Flaw in Cell-Phone Encryption Identified; Design Process Blamed

This is a press release from- Bruce Schneier, Counterpane Systems, 612 823-1098 schneier@counterpane.com- David Wagner, University of California, Berkeley 510-643-9435 daw@cs.berkeley.edu- Robert Sanders, University of California. Berkeley 510-643-6998 rls@pio.urel.berkeley.edu- Lori Sinton, Jump Start Communications, 415-938-2234 lsinton@aol.com

Telecommunications Industry Association algorithm for digital telephones fails under simple cryptanalysis

MINNEAPOLIS, MN. AND BERKELEY, CA., March 20, 1997 - Counterpane Systems and UC Berkeley jointly announced today that researchers have discovered a flaw in the privacy protection used in today's most advanced digital cellular phones. This discovery points to serious problems in the chosed-door process used to develop these privacy measures. This announcement is a setback to the US cellular telephone industry, said Bruce Schneier of Counterpane Systems, a Minneapolis, MN consulting firm specializing in cryptography. The attack can be carried out in a few minutes on a conventional personal computer.

Schneier and John Kelsey of Counterpane Systems, along with graduate student David Wagner of the University of California at Berkeley, plan to publish their analysis in a paper entitled "Cryptanalysis of the Cellular Message Encryption Algorithm (CMEA)." Legislators are scheduled to hold hearings today on Rep. Goodlatte's "SAFE" (Security And Freedom Through Encryption) bill, HR695.

The problem affects numbers dialed on the key pad of a cellular handset, including any telephone, PIN, or credit cards numbers dialed. The system was supposed to protect the privacy of those dialed digits, but the encryption is weak enough that those digits are accessible to eavesdroppers with a digital scanner.

The cryptographers blame the closed-door design process and excessive pressure from U.S. military interests for problems with the privacy standard. The cellular industry attempted to balance national security with consumer privacy concerns. In an attempt to eliminate recurring security problems, the cellular standards arm of the Telecommunications Industry Association(TIA) privately designed this new framework for protecting cellular phones. The system uses encryption to prevent fraud, scramble voice communications, and protect users' privacy. These new protections are being deployed in today's digital cell phones, including CDMA, NAMPS, and TDMA.

Not a new problem

As early as 1992, others - including noted security expert Whitfield Diffie - pointed out fatal flaws in the new standard's voice privacy feature. The two flaws provide a crucial lesson for policy makers and consumers, the researchers said. These weaknesses are symptomatic of broad underlying problems in the design process, according to Wagner.

Many have criticized the National Security Agency (the U.S. military intelligence agency in charge of electronically monitoring foreign powers) for insinuating itself into the design process, pressuring designers to cripple the security of the cellular encryption technique and hamstringing emerging cellular security technology. "The result is weaker protection for everybody," Kelsey said.

"This is another illustration of how U.S. government efforts to control cryptography threaten the security and privacy of Americans," said David Banisar, attorney for the Electronic Privacy Information Center in Washington, D.C.

This is not the first report of security flaws in cellular telephony. Today, most cellular phone calls can be intercepted by anyone in the area listening to a scanner, as House Speaker Newt Gingrich learned this past January when someone with a scanner recorded one of his cellular calls. According to FCC estimates, the cellular telephony industry lost more that $400 million to fraud and security problems last year.

CMEA Technology

CMEA is a symmetric cipher, like the Digital Encryption Standard (DES). It uses a 64-bit key, but weaknesses in the algorithm reduce the key to an effective length of 24 or 32 bits, significantly shorter than even the weak keys the U.S. government allows for export.

Greg Rose, program chair of the 1996 USENIX Security Symposium, put the results in context: This break does not weaken the digital cellular fraud protections. And it's still true that digital cellular systems are much harder to casually eavesdrop on than analog phones. But it's clear from this break that a determined criminal with technical resources can intercept these systems."

Counterpane Systems is a Minneapolis, MN-based consulting firm specializing in cryptography and computer security. Bruce Schneier is president of Counterpane and author of three books on cryptography and security. David Wagner is a founding member of the ISAAC computer security research group at UC Berkeley. In the Fall of 1995, the ISAAC group made headlines by revealing a major flaw in Netscape's web browser. The authors also hasten to thank Greg Rose for his advice.

---

End of RISKS-FORUM Digest 18.92

---

Standard Risks reuse disclaimer:

Reused without explicit authorization under blanket permission granted for all Risks-Forum Digest materials. The author(s), the RISKS moderator, and the ACM have no connection with this reuse. ```

This web service brought to you by Somewhere.Com, LLC.