This document analyzes cryptographic attacks on the A5/1 stream cipher used in GSM cellular networks. It first describes the structure and key generation process of A5/1. It then summarizes several known attacks on A5/1 including:
1) A man-in-the-middle attack developed by Barkan and Biham that recovers the key through a known plaintext attack on the weaker A5/2 cipher and an active attack on A5/1.
2) A time-memory tradeoff attack developed by Golic that recovers the key by building a tree of possible internal states.
3) An attack developed by Biryukov, Shamir, and