ePrints.FRI - University of Ljubljana, Faculty of Computer and Information Science

The COMP128 algorithm and the SIM card

Anže Nunar (2015) The COMP128 algorithm and the SIM card. EngD thesis.

Download (616Kb)


    SIM card has an important role in mobile communications. It contains the user's private key, which is used in COMP128 algorithm for user authentication to the mobile network and generating session keys to encrypt communications. In this thesis a detailed description of COMP128 algorithm is presented. A brute force attack on the algorithm is described, which exploits a weakness in the structure of COMP128 algorithm, and is based on birthday paradox. As a result the user's private key can be obtained in real time. The attack on COMP128 algorithm was also implemented and tested. A separate chapter provides the necessary cryptographic concepts such as authentication, hash functions and birthday paradox.

    Item Type: Thesis (EngD thesis)
    Keywords: COMP128 algorithm, authentication, SIM card, cryptography, brute-force attack, GSM protocol, birthday paradox
    Number of Pages: 44
    Language of Content: Slovenian
    Mentor / Comentors:
    Name and SurnameIDFunction
    doc. dr. Arjana ŽitnikMentor
    Link to COBISS: http://www.cobiss.si/scripts/cobiss?command=search&base=51012&select=(ID=1536612803)
    Institution: University of Ljubljana
    Department: Faculty of Computer and Information Science
    Item ID: 3159
    Date Deposited: 21 Sep 2015 15:50
    Last Modified: 30 Oct 2015 13:05
    URI: http://eprints.fri.uni-lj.si/id/eprint/3159

    Actions (login required)

    View Item