Using a PC and an oscilloscope to clone a 3G/4G SIM card, the cracking process takes only ten minutes. Yu Jiao, a professor at Shanghai Jiaotong University, showed how to successfully copy the SIM card and how a clone card changed the Alipay password and potentially stealed account funds. In February, Edward Snowden revealed that the National Security Agency's NSA and the British intelligence agency GCHQ have stolen millions of SIM card encryption keys from one of the world's largest chip makers. The researchers did not seem to agree.
Chinese professor demonstrates cracking SIM card AES-128 encryption
Crack SIM card encryption
Yu Yu is currently a professor of professional side channel analysis and cryptography at Shanghai Jiaotong University. He has been looking for ways to crack the encryption of 3G and 4G cards last year. These passwords, which are considered unbreakable using AES-128, are finally so easy to obtain through some side channel analysis.
Although various attack 2 g (GSM) algorithms (comp - 128 A5) appear in various documents, no actual attacks are used to attack known 3G/4G (UMTS/LTE) SIM cards. The 3G/4G SIM card uses a two-way authentication algorithm called MILENAGE, which in turn is based on AES-128, which is certified by NIST as a mathematically secure block cipher standard. MILENAGE also uses a nearly pair of 128-bit encryption to further confuse the algorithm.
Side channel attacks measure energy, electromagnetic emissions, and heat generation in the chip. This technology has existed for many years and requires physical access to target devices.
Clone card came into being
Yu Yu and the team assembled an oscilloscope for tracking energy levels, an MP300-SC2 protocol analyzer for monitoring data traffic, a home-made SIM card reader and a standard computer. Despite the simple configuration, they cracked the SIM cards from 8 vendors in 10 to 80 minutes.
The cracking system does not directly read the encryption key. Instead, the team separates 256 parts from the key and associates them with the power state through the SIM card. This does require a lot of calculations and a little luck. Once the system is complete, cracking the key and cloning the card becomes relatively easy.
Yu Yu showed how to successfully copy the SIM card. He also showed how a clone card changed the Alipay password and potentially stealed account funds.
Yu Yu said that mobile phone users and digital security vendors need to raise awareness of physical security. For this "technology", the intelligence department will be very interested.
Block Ferrite Magnet, Square Ferrite Magnet, Ferrite Magnet in Square shape
HU NAN YUBANG MAGNETIC MATERIAL CO.,LTD , https://www.ybmagnet.com