Not too long after the GSM’s 64-bit A5/1 algorithm was cracked
, it was only a matter of time before 3G encryption would be targeted. The onset of 3G networks brought along a higher level of security, but it seems like the GSMA is having a difficult time keeping things encrypted. Although the original MISTY1 algorithm intended for UMTS was classified as intensive, the revised one called KASUMI (Japanese for “mist”) aimed to be easier on hardware with no loss in security. Unfortunately the case was not so with an attack on the algorithm taking several hours to break the encryption. Yes, the code was eventually cracked after an extensive period of time – still making real-time eavesdropping somewhat unconventional. Researchers say that there’s still some room for improvement to optimize the implementation of breaking the code. As with any technological advances, especially with 4G networks expected to boom, the topic of security among networks will always be a concern for anyone. With that, there will always be people attempting to break them for malicious purposes or to expose the loopholes surrounding it.