Использованные материалы


1. Chris Tryhorn. Nice talking to you ... mobile phone use
passes milestone. The Guardian, 2009. Tuesday 3 March
http://www.guardian.co.uk/tech.....ar/03/mobile-phones1[link1] .
2. Ross J. Anderson. Security Engineering: A Guide to Building Dependable
Distributed Systems, chapter 17. Wiley Computer Publishing, 2001. ISBN:
0471389226.
3. February 2010. http://www.ing.nl/particulier/internetbankieren/
internetbankieren/wijzigingen-in-...
4. January 2010. https://svn.berlin.ccc.de/proj.....rprobe/wiki/tracelog[link2]
5. Elad Barkan, Eli Biham, and Nathan Keller. Instant ciphertext-only cryptanalysis
of gsm encrypted communication. In Advances in Cryptology – CRYPTO 2003,
volume 2729/2003, pages 600­616. Springer Berlin / Heidelb erg, 2003.
6. Orr Dunkelman, Nathan Keller, and Adi Shamir. A practical-time attack
on the a5/3 cryptosystem used in third generation gsm telephony. 2010.
http://eprint.iacr.org/ .
7. Marc Briceno, Ian Goldb erg, and David Wagner. A pedagogical implementa-
tion of the gsm a5/1 and a5/2 "voice privacy" encryption algorithms, 1999.
http://cryptome.org/gsm-a512.htm (originally on www.scard.org).
8. Jovan Golic. Cryptanalysis of Al leged A5 Stream Cipher, page 23955. 1997.
9. Elad Barkan and Eli Biham. Conditional Estimators: An Effective Attack on A5/1, page 119. 2005.
10. August 2010. http://www.global-security-sol.....com/GSAudioSurv.html[link3] .
11. January 2010. http://www.ettus.com/ .
12. Septemb er 2009. http://gnuradio.org/trac .
13. January 2010. https://svn.berlin.ccc.de/projects/airprobe/wiki .
14. January 2010. http://www.reflextor.com/trac/a51 .
15. Steve Muller and David Hulton. The a5 cracking project. In Chaos Communication Camp 2007, 2007.
16. January 2010. http://reflextor.com/torrents/ .
17. Erguler, Imran, Anarim, and Emin. A new cryptanalytic time-memory trade-off for stream ciphers. In Computer and Information Sciences – ISCIS 2005, volume 3733 of Lecture Notes in Computer Science, pages 215­223. Springer Berlin / Heidelberg, 2005.
18. Jin Hong, Kyung Jeong, Eun Kwon, In-Sok Lee, and Daegun Ma. Variants of the
distinguished point method for cryptanalytic time memory trade-offs. In Information Security Practice and Experience, volume 4991 of Lecture Notes in Computer Science, pages 131­145. Springer Berlin / Heidelb erg, 2008.
19. September 2009. http://openbts.sourceforge.net/ .
20. September 2009. http://bs11-abis.gnumonks.org/trac/wiki/OpenBSC .
21. Karsten Nohl and Chris Paget. Gsm – srsly? presented at 26C3 in Berlin,
22. European Telecommunications Standards Institute, France. Digital cellular
telecommunications system (Phase 2);Mobile Station – Base Stations System (MS – BSS) interface Data Link (DL) layer specification, 2010. TS 44.006 v9.1.0.

Назад[link6] | Оглавление[link7]

Ссылки
[link1] http://www.guardian.co.uk/technology/2009/mar/03/mobile-phones1

[link2] https://svn.berlin.ccc.de/projects/airprobe/wiki/tracelog

[link3] http://www.global-security-solutions.com/GSAudioSurv.html

[link4] http://video.google.com/videoplay?docid=8955054591690672567

[link5] http://events.ccc.de/congress/2009/Fahrplan/attachments/1519_26C3.Karsten.Nohl.GSM.pdf

[link6] https://www.pgpru.com/biblioteka/statji/eavesdroppingongsm/references

[link7] https://www.pgpru.com/biblioteka/statji/eavesdroppingongsm