Hi Hello,
Please excuse the banners and adds, but it's free ;)

Anyway I did my FYP (Final year Project) on GSM and the encryption used in this service. I discovered it was pretty slack.
Please feel free to Peruse the following documents

*   "Brief Description of the Project"--- HTML version
*   "Cryptanalysis of the GSM Algorithms"--- Full HTML version
*   "Cryptanalysis of the GSM Algorithms"--- HTML version not including appendices
*   "Cryptanalysis of the GSM Algorithms"--- HTML version appendices only
*   "Cryptanalysis of the GSM Algorithms"--- PDF version not including appendices
*   "Cryptanalysis of the GSM Algorithms"--- PDF version appendices only
*   My PGP Public key
*   Other GSM Secuirty files

In Brief:

    The Project involved the investigation of the cryptographic Strength of the algorithms used in GSM Mobile phones. This included investigating previous attacks, simulating the GSM environment and generating attacks on this environment. I launched an actual attack on a SIM card after building a SMART card reader circuit, and extracted it's secret key by cracking the A3/A8 algorithms making it possible to clone that SIM card. As well as launching Attaches on A5 and showing that A5/2 is insecure. Any Question Comments etc. eoinward@yahoo.com
1