A5 encryption algorithms

GPTKB entity

Statements (29)
Predicate Object
gptkbp:instanceOf encryption algorithm family
gptkbp:A5/0 no encryption
gptkbp:A5/1 crypt
used in Europe
key length 64 bits
vulnerable to cryptanalysis
gptkbp:A5/2 crypt
key length 64 bits
used in export markets
vulnerable to cryptanalysis
gptkbp:A5/3 based on KASUMI cipher
key length 128 bits
stronger security than A5/1 and A5/2
used in 3G networks
gptkbp:A5/4 key length 128 bits
used in satellite phone systems
gptkbp:deployment 1990s
gptkbp:developedBy gptkb:ETSI
https://www.w3.org/2000/01/rdf-schema#label A5 encryption algorithms
gptkbp:includes gptkb:A5/1
gptkb:A5/2
A5/3
A5/0
A5/4
gptkbp:purpose data privacy
voice privacy
gptkbp:usedIn gptkb:GSM_mobile_communications
gptkbp:bfsParent gptkb:GSM_networks
gptkbp:bfsLayer 6