Mobiles may be vulnerable to spying due to outdated technique
- Third phase of LS polls ends: High turnout in 91 seats; Chandigarh tops with 74 per cent
- BJP sacks Jaswant Singh's son Manvendra; Ansari not to contest against Modi
- #WhyiVoted: Let's hear it from India
- Narendra Modi slams Mamata Banerjee, says she is playing vote bank politics
- Mulayam questions death penalty for rape, says 'boys make mistakes'
Millions of mobile phones may be vulnerable to spying due to the use of an outdated 1970-era cryptography technique, according to a new research. The research, due to be presented at an upcoming Black Hat security conference in the US, cites phones running the risk of their security being breached due to use of the old cryptography technique.
Cryptography allows communication to take place securely over a mobile network. Karsten Nohl, an expert cryptographer with Security Research Labs, has found a way to trick mobile phones into granting access to the device's location, SMS functions and allow changes to a person's voicemail number. Nohl's presentation, "Rooting SIM cards," will take place at the Black Hat security conference in Las Vegas on July 31.
His research looked at a mobile phone's SIM (Subscriber Identification Module), the small card inserted into a device that ties it to a phone number and authenticates software updates and commands sent over-the-air from an operator. More than 7 billion SIM cards are in use worldwide. To ensure privacy and security, SIM cards use encryption when communicating with an operator, but the encryption standards use vary widely.
Nohl's research found that many SIMs use a weak encryption standard dating from the 1970s called DES (Data Encryption Standard), according to a preview posted on his company's blog. DES has long been considered a weak form of encryption, and many mobile operators have upgraded now to more secure forms.
It is relatively easy to discover the private key used to sign content encrypted with DES. In its experiment, Security Research Labs sent a binary code over SMS to a device using a SIM with DES. Since the binary code wasn't properly cryptographically signed, it would not run on the device. But while rejecting the code, the phone's SIM makes a crucial mistake: it sends back over SMS an error code that carries its own encrypted 56-bit private key, according to the company.
- Neemu Bhoumik seeks LS entry; people’s issues, Raiganj roots in mind
- Another Bittu, Simerjit file papers as Independents
- Firing at district food and civil supplies office, one injured
- Day after stand-off with EC, Didi vows ‘revenge’ over ‘insult’ by Delhi
- ‘Hate’ speech: Amit Shah moves HC for stay on arrest, quashing of FIRs
- Adarsh Shastri ‘covers’ for AAP’s Jaaferi