• The COMP128 algorithms are implementations of the A3 and A8 functions defined in the GSM standard. A3 is used to authenticate the mobile station to the...
    5 KB (532 words) - 17:51, 19 February 2021
  • SIM cards can be cloned by performing a cryptographic attack against the COMP128 authentication algorithm used by these older SIM cards. By connecting the...
    6 KB (694 words) - 15:37, 1 May 2025
  • A8 algorithms are generally implemented together (known as A3/A8, see COMP128). An A3/A8 algorithm is implemented in Subscriber Identity Module (SIM)...
    22 KB (3,082 words) - 21:44, 20 February 2025
  • successfully demonstrated the cloning of a GSM customer card, breaking the COMP128 encryption algorithm used at that time by many GSM SIMs. In 2001, the CCC...
    25 KB (2,471 words) - 09:14, 3 May 2025