Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Elad Barkan is active.

Publication


Featured researches published by Elad Barkan.


international cryptology conference | 2003

Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication

Elad Barkan; Eli Biham; Nathan Keller

In this paper we present a very practical ciphertext-only cryptanalysis of GSM encrypted communication, and various active attacks on the GSM protocols. These attacks can even break into GSM networks that use “unbreakable” ciphers. We describe a ciphertext-only attack on A5/2 that requires a few dozen milliseconds of encrypted off-the-air cellular conversation and finds the correct key in less than a second on a personal computer. We then extend this attack to a (more complex) ciphertext-only attack on A5/1. We describe new attacks on the protocols of networks that use A5/1, A5/3, or even GPRS. These attacks are based on security flaws of the GSM protocols, and work whenever the mobile phone supports A5/2. We emphasize that these attacks are on the protocols, and are thus applicable whenever the cellular phone supports a weak cipher, for instance they are also applicable using the cryptanalysis of A5/1. Unlike previous attacks on GSM that require unrealistic information, like long known plaintext periods, our attacks are very practical and do not require any knowledge of the content of the conversation. These attacks allow attackers to tap conversations and decrypt them either in real-time, or at any later time. We also show active attacks, such as call hijacking, altering of data messages and call theft.


international conference on the theory and application of cryptology and information security | 2002

In How Many Ways Can You Write Rijndael

Elad Barkan; Eli Biham

In this paper we ask the question what happens if we replace all the constants in Rijndael, including the replacement of the irreducible polynomial, the coefficients of the MixColumn operation, the affine transformation in the S box, etc. We show that such replacements can create new dual ciphers, which are equivalent to the original in all aspects. We present several such dual ciphers of Rijndael, such as the square of Rijndael, and dual ciphers with the irreducible polynomial replaced by primitive polynomials. We also describe another family of dual ciphers consisting of the logarithms of Rijndael.We then discuss self-dual ciphers, and extend our results to other ciphers.


international cryptology conference | 2006

Rigorous bounds on cryptanalytic time/memory tradeoffs

Elad Barkan; Eli Biham; Adi Shamir

In this paper we formalize a general model of cryptanalytic time/memory tradeoffs for the inversion of a random function f:{0,1,..., N–1} ↦{0,1,..., N–1}. The model contains all the known tradeoff techniques as special cases. It is based on a new notion of stateful random graphs. The evolution of a path in the stateful random graph depends on a hidden state such as the color in the Rainbow scheme or the table number in the classical Hellman scheme. We prove an upper bound on the number of images y=f(x) for which f can be inverted, and derive from it a lower bound on the number of hidden states. These bounds hold for an overwhelming majority of the functions f, and their proofs are based on a rigorous combinatorial analysis. With some additional natural assumptions on the behavior of the online phase of the scheme, we prove a lower bound on its worst-case time complexity


international conference on selected areas in cryptography | 2005

Conditional estimators: an effective attack on A5/1

Elad Barkan; Eli Biham

T=\Omega(\frac{N^2}{M^2 \ln N})


Archive | 2006

Cryptanalysis of Ciphers and Protocols

Elad Barkan; Eli Biham

, where M is the memory complexity. Finally, we describe new rainbow-based time/memory/data tradeoffs, and a new method for improving the time complexity of the online phase (by a small factor) by performing a deeper analysis during preprocessing.


Archive | 2004

Cryptoanalysis method and system

Elad Barkan; Eli Biham

Irregularly-clocked linear feedback shift registers (LFSRs) are commonly used in stream ciphers. We propose to harness the power of conditional estimators for correlation attacks on these ciphers. Conditional estimators compensate for some of the obfuscating effects of the irregular clocking, resulting in a correlation with a considerably higher bias. On GSMs cipher A5/1, a factor two is gained in the correlation bias compared to previous correlation attacks. We mount an attack on A5/1 using conditional estimators and using three weaknesses that we observe in one of A5/1s LFSRs (known as R2). The weaknesses imply a new criterion that should be taken into account by cipher designers. Given 1500–2000 known-frames (about 4.9–9.2 conversation seconds of known keystream), our attack completes within a few tens of seconds to a few minutes on a PC, with a success rate of about 91%. To complete our attack, we present a source of known-keystream in GSM that can provide the keystream for our attack given 3–4 minutes of GSM ciphertext, transforming our attack to a ciphertext-only attack.


IACR Cryptology ePrint Archive | 2002

The Book of Rijndaels.

Elad Barkan; Eli Biham


Archive | 2003

NESSIE D21 - Performance of Optimized Implementations of the NESSIE Primitives

Bart Preneel; Bart Van Rompay; Sidi Ben Ors; Alex Biryukov; Louis Granboulan; Emmanuelle Dottax; Markus Dichtl; Markus Schafheutle; Pascale Serf; Stefan Pyka; Eli Biham; Elad Barkan; Orr Dunkelman; J. Stolin


Archive | 2012

Cryptanalysis Method and System

Elad Barkan; Eli Biham


Lecture Notes in Computer Science | 2006

Conditional estimators : An effective attack on A5/1

Elad Barkan; Eli Biham

Collaboration


Dive into the Elad Barkan's collaboration.

Top Co-Authors

Avatar

Eli Biham

Technion – Israel Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alex Biryukov

University of Luxembourg

View shared research outputs
Top Co-Authors

Avatar

Bart Preneel

University of Luxembourg

View shared research outputs
Top Co-Authors

Avatar

Louis Granboulan

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar

Adi Shamir

Weizmann Institute of Science

View shared research outputs
Top Co-Authors

Avatar

Bart Van Rompay

Katholieke Universiteit Leuven

View shared research outputs
Researchain Logo
Decentralizing Knowledge