A5/2 is a stream cipher used to provide voice privacy in the GSM cellular telephone protocol. It was used instead of the stronger A5/1 for export. It is one of seven A5 ciphering algorithms which have been defined for GSM use. 
In 1999, Ian Goldberg and David A. Wagner cryptanalyzed A5/2 in the same month it was published, and showed that it was extremely weak – so much so that low end equipment can probably break it in real time.
Since July 1, 2006, the GSMA (GSM Association) mandated that GSM Mobile Phones will not support the A5/2 Cipher any longer, due to its weakness, and the fact that A5/1 is deemed mandatory by the 3GPP association. In July 2007, the 3GPP has approved a change request to prohibit the implementation of A5/2 in any new mobile phones. If the network does not support A5/1, or any other A5 algorithm implemented by the phone, then an unencrypted connection can be used.
- A5/2 at CryptoDox
- A5/2 withdrawal at security.osmocom.org
- Ian Goldberg, David Wagner, Lucky Green. The (Real-Time) Cryptanalysis of A5/2. Rump session of Crypto'99, 1999.
- Barkam, Elad; Biham, Eli; Keller, Nathan (2008), Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication, Journal of Cryptology 21 (3): 392–429, doi:10.1007/s00145-007-9001-y
- Tool for cracking the GSM A5/2 cipher, written by Nicolas Paglieri and Olivier Benjamin: A52HackTool (with full source code – C language – GNU GPL)
|This cryptography-related article is a stub. You can help Wikipedia by expanding it.|