Open Access Open Access  Restricted Access Subscription or Fee Access

Data Security in Mobile Communication

Sachin Majithia, Dinesh Kumar

Abstract


Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world. Main objective in mobile communication systems is security of data exchanged. GSM uses several cryptographic algorithms for security like A5/1, A5/2 and A5/3. From extensive literature survey it has been found that these algorithms are cracked by various practical attacks so these algorithms do not provide sufficient levels of security for protecting the confidentiality of GSM therefore it is desirable to secure data by additional encryption. In this paper we have proposed additional encryption by implementing DES, TripleDES, and AES algorithms on GSM Network. For testing these algorithms on GSM,sending and receiving code is simulated by doing GSM encoding and decoding. This paper also analyzes the effectiveness of these algorithms against brute force attack implemented in MATLAB environment.


Keywords


AES, DES, GSM, Keylengths, Security, TripleDES, GSM

Full Text:

PDF

References


David G. W. Birch and Ian J. Shaw, “Mobile communications securityprivate or public”, IEE, June 1994.

3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; 3G Security; Specification of the A5/33 Encryption Algorithms for GSM and ECSD, and the GEA3 Encryption Algorithm for GPRS; Document 4: Design and evaluation report.

3GPP TS 35.202: Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi specification". 3GPP.2009.http://www.3gpp.org/ftp/Specs/htmlinfo/35202.htm.

P. Chandra, “Bulletproof Wireless Security: GSM, UMTS, 802.11 and Ad hoc Security,” Elsevier, 2005.

"Wireless Security Handbook,” Auerbach Publications 2005.

Ross Anderson, Mike Roe "A5 - The GSMEncryption Algorithm",1994.

J. Golic, Cryptanalysis of Alleged A5 Stream Cipher, proceedings of EUROCRYPT'97, LNCS 1233,pp.239{255, Springer-Verlag 1997.

Anon., Crack A5, [referred 29.9.1999] < http://jya.com/crack-a5.htm >BOOK REVIEW: The Advanced Encryption Standard Computer Law & Security Report, Volume 18, Issue 5, 1 October 2002, Page 337

Intel Corporation, http://www.intel.com

Technical information: GSM System Security Study, http://jya.com/gsm061088.htm

Lauri Tarkkala, “Tik-110.551: Attacks against A5”, Tik 110.551 Seminar on Network Security, pp.1-15 2000].

Michael Stausholm,, and Morten Dahl, Insecurity of GSM Communication December 15, 2006.

Orr Dunkelman, Nathan Keller, and Adi Shamir “A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony” 2009

Dr. S. Muhammad Siddique and Muhammad Amir “GSM Security Issues and Challenges” Proceedings of the Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, an Parallel/Distributed Computing (SNPD’06) 2006

Michael Stausholm,, and Morten Dahl, Insecurity of GSM Communication December 15, 2006.

W. Diffie, M. E. Hellman, “New Directions in Cryptography,” IEEE Transactions on Information Theory, Vol. 22, No. 6, pp.644-654, Nov.1976.

The Advanced Encryption Standard Network Security, Volume 2001, Issue 10, 31 October 2001, Pages 11-13 Marie A. Wright

The Advanced Encryption Standard — Implementation and Transition to a New Cryptographic Benchmark Network Security, Volume 2002, Issue 7, 1 July 2002, Pages 7-9 Juan C. Asenjo

Reducing the exhaustive key search of the Data Encryption Standard (DES) Computer Standards & Interfaces, Volume 29, Issue 5, July 2007, Pages 528-530 Raphael C.-W. Phan

Hudson, R.L., "Snooping versus Secrecy," Wall Street Journal, February 11, 1994, p. R14 Schneier, B., "Applied Cryptography," J. Wiley

M. Wiener, “Brute force attacks on cryptographic keys”, October, 2001.[Online] Available at http://www.cl.cam.ac.uk/~rnc1/brute.html.

Schneier, B., "Applied Cryptography," J. Wiley & Sons, 1994.

Yang, H., et. al., "Securing A Wireless World," Proceedings Of The IEEE v. 94 no. 2 Feb. 2006, http://www.cs.ucla.edu/~hyang/paper/ProcIEEE05.ps

Van der Arend, P. J. C., "Security Aspects and the Implementation in the GSM System," Proceedings of the Digital Cellular Radio Conference,Hagen, Westphalia, Germany, October, 1988


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.