CNN logo
Navigation
 
COMMUNITY 
Message Boards 
Chat 
Feedback 

SITE SOURCES 
Contents 
Help! 
Search 
CNN Networks 

SPECIALS 
Quick News 
Almanac 
Video Vault 
News Quiz 


Infoseek/Big Yellow


Pathfinder/Warner Bros


Barnes and Noble






Tech banner IBM scalable e-business solutions
rule

Cryptographers crack digital cell phone code

graphic April 14, 1998
Web posted at: 6:34 p.m. EDT (2234 GMT)

BERKELEY, California (AP) -- It was a challenge a trio of computer students and professionals could not resist: proving "tamperproof" digital cellular phones are actually vulnerable.

After about six hours of work, two graduate students at the University of California at Berkeley and a computer cryptologist were able to "clone" the phone, allowing them to make unauthorized calls from another phone.

"Given the state of the security of other cellular phone systems, I wasn't terribly, terribly surprised," said Ian Goldberg, one of the students. The three looked at the project as a challenge.

USA Today reported the breakthrough on Monday.

Still, the amount of time and effort it took to clone the codes makes the digital phone security much more difficult to circumvent than analog cellular phones, which in comparison are easily breached.

The three cracked the codes guarding a Global System for Mobile Communications phone. The GSM digital standard is the most widely used in the world, with more than 79 million phones in use. The standard is used primarily in Europe.

Goldberg and student David Wagner were part of a group that announced last year they had cracked the weaker encryption codes used by the U.S. cellular phone system.

Overcoming the security also revealed a hint that the code may have been intentionally weakened during its design to allow government agencies the ability to eavesdrop on telephone conversations, The New York Times reported Tuesday.

Marc Briceno of Smartcard Developers Association, who worked with Goldberg and Wagner, said the weakened code would let powerful computers available to intelligence agencies decode a voice conversation relatively quickly.

"I can't think of any other reason for what they did," Briceno said.

For years, the computer industry has been rife with rumors about government intrusion or intimidation. Little evidence has ever emerged to support such speculation, the Times reported, but the origins of the GSM system are hazy.

Copyright 1998   The Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

 
rule

Related stories:

Related sites:

Note: Pages will open in a new browser window

External sites are not endorsed by CNN Interactive.


Infoseek search  


rule

Watch Science & Technology Week on CNN for more sci-tech stories.

rule
Message Boards Sound off on our
message boards & chat


IBM scalable e-business solutions
rule

© 1998 Cable News Network, Inc.
A Time Warner Company
All Rights Reserved.

Terms under which this service is provided to you.
Read our privacy guidelines.