{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T17:40:07Z","timestamp":1774719607466,"version":"3.50.1"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031790065","type":"print"},{"value":"9783031790072","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-79007-2_3","type":"book-chapter","created":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T20:01:21Z","timestamp":1738094481000},"page":"45-61","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Determining the\u00a0A5 Encryption Algorithms Used in\u00a02G (GSM) Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0459-6580","authenticated-orcid":false,"given":"Danielle","family":"Morgan","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,1,29]]},"reference":[{"key":"3_CR1","unstructured":"3rd Generation Partnership Project: 3G Security; Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification (3GPP TS 35.202 version 17.0.0 Release 17). https:\/\/www.etsi.org\/deliver\/etsi_ts\/135200_135299\/135202\/17.00.00_60\/ts_135202v170000p.pdf. Accessed 04 Dec 2023"},{"key":"3_CR2","unstructured":"3rd Generation Partnership Project: Digital cellular telecommunications system (Phase 2+); Security-related network functions (3GPP TS 03.20 version 8.6.0 Release 1999). https:\/\/www.etsi.org\/deliver\/etsi_ts\/100900_100999\/100929\/08.06.00_60\/ts_100929v080600p.pdf. Accessed 20 May 2024"},{"key":"3_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"600","DOI":"10.1007\/978-3-540-45146-4_35","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"E Barkan","year":"2003","unstructured":"Barkan, E., Biham, E., Keller, N.: Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 600\u2013616. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_35"},{"key":"3_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/3-540-44495-5_5","volume-title":"Progress in Cryptology \u2014INDOCRYPT 2000","author":"E Biham","year":"2000","unstructured":"Biham, E., Dunkelman, O.: Cryptanalysis of the A5\/1 GSM Stream Cipher. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 43\u201351. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44495-5_5"},{"key":"3_CR5","unstructured":"CellularPrivacy: Android-IMSI-Catcher-Detector. https:\/\/github.com\/CellularPrivacy\/Android-IMSI-Catcher-Detector. Accessed 22 Dec 2023"},{"key":"3_CR6","doi-asserted-by":"publisher","unstructured":"Claverie, T., Avoine, G., Leblanc-Albarel, D., Carpent, X., Devine, C.: Time-Memory Trade-Offs Sound the Death Knell for GPRS and GSM. Springer (2024). https:\/\/doi.org\/10.1007\/978-3-031-68385-5_7","DOI":"10.1007\/978-3-031-68385-5_7"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Dabrowski, A., Pianta, N., Klepp, T., Mulazzani, M., Weippl, E.: IMSI-catch me if you can: IMSI-catcher-catchers. In: Proceedings of the 30th Annual Computer Security Applications Conference, ACSAC 2014, pp. 246\u2013255. Association for Computing Machinery, New York (2014). https:\/\/doi.org\/10.1145\/2664243.2664272","DOI":"10.1145\/2664243.2664272"},{"key":"3_CR8","unstructured":"Morgan, D.: A5 identifier. https:\/\/github.com\/morganedge\/a5_identifier"},{"key":"3_CR9","unstructured":"Dunkelman, O., Keller, N., Shamir, A.: A Practical-Time Attack on the A5\/3 Cryptosystem Used in Third Generation GSM Telephony. Cryptology ePrint Archive, Paper 2010\/013 (2010). https:\/\/eprint.iacr.org\/2010\/013. Accessed 14 May 2023"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Ebersp\u00e4cher, J., V\u00f6gel, H.J., Bettstetter, C., Hartmann, C.: GSM - Architecture, Protocols and Services, 3rd edn. Wiley (2009)","DOI":"10.1002\/9780470741719"},{"key":"3_CR11","unstructured":"European Telecommunications Standards Institute: Security Algorithms Group of Experts (SAGE); Report on the specification and evaluation of the GSM cipher algorithm A5\/2 (1996). https:\/\/web.archive.org\/web\/20131204061251\/. http:\/\/www.etsi.org\/deliver\/etsi_etr\/200_299\/278\/01_60\/etr_278e01p.pdf. Accessed 24 Dec 2023"},{"key":"3_CR12","unstructured":"Stevenson, F.A.: kraken. https:\/\/github.com\/0xh4di\/kraken. Accessed 22 May 2023"},{"key":"3_CR13","unstructured":"GSM Association: Security Algorithm Deployment Guidance Version 3.0. Techncial report, GSMA (2022). https:\/\/www.gsma.com\/solutions-and-impact\/technologies\/security\/wp-content\/uploads\/2022\/09\/FS.35-v3.0.pdf"},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"Karakoc, B., F\u00fcrste, N., Rupprecht, D., Kohls, K.: Never Let Me Down Again: Bidding-Down Attacks and Mitigations in 5G and 4G. In: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023 (2023). https:\/\/doi.org\/10.1145\/3558482.3581774","DOI":"10.1145\/3558482.3581774"},{"key":"3_CR15","unstructured":"Nohl, K.: Attacking phone privacy (2010). https:\/\/web.archive.org\/web\/20190301111108\/https:\/\/www.srlabs.de\/wp-content\/uploads\/2010\/07\/Attacking.Phone_.Privacy_Karsten.Nohl_1-1.pdf"},{"key":"3_CR16","unstructured":"KimiNewt: PyShark. https:\/\/kiminewt.github.io\/pyshark\/. Accessed 20 Aug 2024"},{"key":"3_CR17","unstructured":"Sauter, M.: From GSM to LTE-Advanced: An Introduction to Mobile Networks and Mobile Broadband, Revised Second Edition. Wiley (2014). https:\/\/learning.oreilly.com\/library\/view\/from-gsm-to\/9781118861929\/. Accessed 21 Aug 2024"},{"key":"3_CR18","unstructured":"Shanahan, M., Bahia, K.: The State of Mobile Internet Connectivity 2023. Technical report, GSMA (2023). https:\/\/www.gsma.com\/r\/wp-content\/uploads\/2023\/10\/The-State-of-Mobile-Internet-Connectivity-Report-2023.pdf"},{"key":"3_CR19","unstructured":"Osmocom: OsmocomBB. https:\/\/osmocom.org\/projects\/baseband\/wiki. Accessed 20 May 2024"},{"key":"3_CR20","unstructured":"Osmocom: OsmocomBB Compatible Phones. https:\/\/osmocom.org\/projects\/baseband\/wiki\/Phones. Accessed 20 May 2024"},{"key":"3_CR21","unstructured":"Osmocom: OsmocomBB mobile program. https:\/\/osmocom.org\/projects\/baseband\/wiki\/Mobile. Accessed 20 May 2024"},{"key":"3_CR22","unstructured":"Osmocom: Withdrawal of A5\/2 algorithm support (2016). https:\/\/projects.osmocom.org\/projects\/security\/wiki\/A52_Withdrawal. Accessed 20 May 2024"},{"key":"3_CR23","unstructured":"Osmocom: softSIM (2022). https:\/\/osmocom.org\/projects\/baseband\/wiki\/SoftSIM. Accessed 07 June 2024"},{"key":"3_CR24","unstructured":"Krysik, P., Khassraf, R., Yanitskiy, V., Velichkov, V., Robyns, P.: The gr-gsm project. https:\/\/osmocom.org\/projects\/gr-gsm\/wiki\/Gr-gsm\u2019s_wiki. Accessed 10 May 2024"},{"key":"3_CR25","unstructured":"Security Research Labs: GSM Map. https:\/\/gsmmap.org\/. Accessed 27 Aug 2024"},{"key":"3_CR26","unstructured":"Security Research Labs: SnoopSnitch. https:\/\/github.com\/srlabs\/snoopsnitch. Accessed 15 July 2023"},{"key":"3_CR27","unstructured":"Security Research Labs: SnoopSnitch FAQ. https:\/\/opensource.srlabs.de\/projects\/snoopsnitch\/wiki\/FAQ. Accessed 26 July 2023"},{"key":"3_CR28","unstructured":"Security Research Labs: Mobile network security report: Estonia (2014). https:\/\/gsmmap.org\/assets\/pdfs\/gsmmap.org-country_report-Estonia-2014-12.pdf. Accessed 20 May 2024"},{"key":"3_CR29","unstructured":"Meyer, S.: Breaking GSM with rainbow Tables (2010). https:\/\/arxiv.org\/pdf\/1107.1086. Accessed 21 Aug 2024"},{"key":"3_CR30","unstructured":"Udar, S., Borgaonkar, R.: Darshak. https:\/\/github.com\/darshakframework\/darshak. Accessed 22 Dec 2023"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-79007-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T20:01:28Z","timestamp":1738094488000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-79007-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031790065","9783031790072"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-79007-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"29 January 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The author has no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"NordSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nordic Conference on Secure IT Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Karlstad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nordsec2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/nordsec2024.kau.se\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}