Indian National Workshop on Cryptography

R. A. Hettinga rah at shipwright.com
Tue Oct 14 12:22:54 EDT 2003


<http://www.ciol.com/cgi-bin/printer.asp?id=50186>

?
Tuesday, October 14, 2003 
 Cyber India Online 

National workshop on cryptography 

PUNE: Cryptography was until recently an exclusive domain of the defense and security agencies. However, with the explosive growth of computerization, networking and the Internet coupled with the increasing importance of electronic commerce, cryptography has become an essential component of all electronic data exchange and economic activity. 

The AU-KBC Research Center has organized its annual workshop, which is an annual event of the "Cryptology Research Society of India" (CRSI) to focus on this subject. This year's workshop, which would be from October 16, 2003 - October 18, 2003 at Hyderabad is based on the theme "Applications of cryptology to Information Security". Satyakam Mishra (certified ethical hacker) and Dr. SA Vetha Manickam of Network Security Solutions, Pune will present a paper on "Software implementation of attack on A5/1 with possible improvements" at the workshop. 

As part of the effort, Satyakam and Dr. Manickam have implemented an attack against A5/1, the strong over the air voice privacy algorithm for GSM networks, on an IBM PC. Eli Biham and Orr Dunkelmann described the attack in a recent paper. With their effort, in a simulated environment, they were able to recover the 64 bit secret key. They were also able to find errors in the Bihams attack and the effect was increase in proposed complexity from 240.97 to 241.29. The paper describes the attack techniques, the implementation, and some optimizations to make the attack more efficient from the earlier work. 

Network Security Solutions has developed an esoteric expertise and capability in consulting, research and development in PKI Infrastructure, Cryptography that includes development of pseudo- random generator, development of a new stream cipher, implementations on secret sharing schemes and various Cryptanalysis techniques, WEP cracking and key clustering. 


-- 
-----------------
R. A. Hettinga <mailto: rah at ibuc.com>
The Internet Bearer Underwriting Corporation <http://www.ibuc.com/>
44 Farquhar Street, Boston, MA 02131 USA
"... however it may deserve respect for its usefulness and antiquity,
[predicting the end of the world] has not been found agreeable to
experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo at metzdowd.com



More information about the cryptography mailing list