New Practical Attacks on GEA-1 Based on a New-Found Weakness

GEA-1, a proprietary stream cipher, was initially designed and used to protect against eavesdropping general packet radio service (GPRS) between the phone and the base station. Now, a variety of current mobile phones still support this standard cipher. In this paper, a structural weakness of the GEA...

Full description

Saved in:
Bibliographic Details
Main Authors: Zheng Wu, Lin Ding, Zhengting Li, Xinhai Wang, Ziyu Guan
Format: Article
Language:English
Published: Wiley 2024-01-01
Series:IET Information Security
Online Access:http://dx.doi.org/10.1049/2024/6674019
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832558673610670080
author Zheng Wu
Lin Ding
Zhengting Li
Xinhai Wang
Ziyu Guan
author_facet Zheng Wu
Lin Ding
Zhengting Li
Xinhai Wang
Ziyu Guan
author_sort Zheng Wu
collection DOAJ
description GEA-1, a proprietary stream cipher, was initially designed and used to protect against eavesdropping general packet radio service (GPRS) between the phone and the base station. Now, a variety of current mobile phones still support this standard cipher. In this paper, a structural weakness of the GEA-1 stream cipher that has not been found in previous works is discovered and analyzed. That is the probability that two different inputs of GEA-1 generate the identical keystream can be up to 2−7.30, which is quite high compared with an ideal stream cipher that generates random sequences. Based on this newfound weakness, a new practical distinguishing attack on GEA-1 is proposed, which shows that the keystreams generated by GEA-1 are far from random and can be easily distinguished with a practical time cost. After then, a new practical key recovery attack on GEA-1 is presented. It has a time complexity of 221.02 GEA-1 encryptions and requires only seven related keys, which is much less than the existing related key attack on GEA-1. The experimental results show that GEA-1 can be broken within about 41.75 s on a common PC in the related key setting. These cryptanalytic results show that GEA-1 cannot provide enough security and should be immediately prohibited to be supported in the massive GPRS devices.
format Article
id doaj-art-9e31f9709c654d18aa7d7bb4bbb08527
institution Kabale University
issn 1751-8717
language English
publishDate 2024-01-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-9e31f9709c654d18aa7d7bb4bbb085272025-02-03T01:31:53ZengWileyIET Information Security1751-87172024-01-01202410.1049/2024/6674019New Practical Attacks on GEA-1 Based on a New-Found WeaknessZheng Wu0Lin Ding1Zhengting Li2Xinhai Wang3Ziyu Guan4PLA SSF Information Engineering UniversityPLA SSF Information Engineering UniversityPLA SSF Information Engineering UniversityPLA SSF Information Engineering UniversityPLA SSF Information Engineering UniversityGEA-1, a proprietary stream cipher, was initially designed and used to protect against eavesdropping general packet radio service (GPRS) between the phone and the base station. Now, a variety of current mobile phones still support this standard cipher. In this paper, a structural weakness of the GEA-1 stream cipher that has not been found in previous works is discovered and analyzed. That is the probability that two different inputs of GEA-1 generate the identical keystream can be up to 2−7.30, which is quite high compared with an ideal stream cipher that generates random sequences. Based on this newfound weakness, a new practical distinguishing attack on GEA-1 is proposed, which shows that the keystreams generated by GEA-1 are far from random and can be easily distinguished with a practical time cost. After then, a new practical key recovery attack on GEA-1 is presented. It has a time complexity of 221.02 GEA-1 encryptions and requires only seven related keys, which is much less than the existing related key attack on GEA-1. The experimental results show that GEA-1 can be broken within about 41.75 s on a common PC in the related key setting. These cryptanalytic results show that GEA-1 cannot provide enough security and should be immediately prohibited to be supported in the massive GPRS devices.http://dx.doi.org/10.1049/2024/6674019
spellingShingle Zheng Wu
Lin Ding
Zhengting Li
Xinhai Wang
Ziyu Guan
New Practical Attacks on GEA-1 Based on a New-Found Weakness
IET Information Security
title New Practical Attacks on GEA-1 Based on a New-Found Weakness
title_full New Practical Attacks on GEA-1 Based on a New-Found Weakness
title_fullStr New Practical Attacks on GEA-1 Based on a New-Found Weakness
title_full_unstemmed New Practical Attacks on GEA-1 Based on a New-Found Weakness
title_short New Practical Attacks on GEA-1 Based on a New-Found Weakness
title_sort new practical attacks on gea 1 based on a new found weakness
url http://dx.doi.org/10.1049/2024/6674019
work_keys_str_mv AT zhengwu newpracticalattacksongea1basedonanewfoundweakness
AT linding newpracticalattacksongea1basedonanewfoundweakness
AT zhengtingli newpracticalattacksongea1basedonanewfoundweakness
AT xinhaiwang newpracticalattacksongea1basedonanewfoundweakness
AT ziyuguan newpracticalattacksongea1basedonanewfoundweakness