GSM Security and Encryption

0 %
100 %
Information about GSM Security and Encryption

Published on August 16, 2010

Author: kittukind


GSM Security and Encryption : GSM Security and Encryption P.Suneetha II MCA 10040 What is GSM? : What is GSM? GSM stands for Global System for Mobile Communication . The GSM emerged in the early 1970s. The GSM is a circuit-switched system that divides each 200 kHz channel into eight 25 kHz time-slots. The GSM owns a market share of more than 70 percent of the world's digital cellular subscribers. Why GSM? : Why GSM? International roaming. Low-cost mobile sets and base stations (BSs) High-quality speech Compatibility with Integrated Services Digital Network (ISDN) and other telephone company services. Support for new services. GSM Brief History: : GSM Brief History: 1982 CEPT establishes a GSM group in order to develop the standards for a pan-European cellular mobile system. 1987 Time Division Multiple Access (TDMA) is chosen as the access method 1988 GSM system is validated. Tele-communicationsGSM - Architecture : Tele-communicationsGSM - Architecture GSM network areas: : GSM network areas: Cell Location Area MSC Service Area PLMN GSM - User Services : GSM - User Services Telephony Services Data Services. Supplementary Services GSM Security Model : GSM Security Model The Purpose of GSM Security: : The Purpose of GSM Security: The access to the mobile services. Any relevant item from being disclosed at the radio path, mainly in order to ensure the privacy of user-related information. Security Features of GSM : Security Features of GSM Authentication of the registered subscribers only Secure data transfer through the use of encryption Subscriber identity protection Mobile phones are inoperable without a SIM Duplicate SIM are not allowed on the network The authentication procedure : The authentication procedure · The mobile station sends IMSI to the network · The network received the IMSI and found the correspondent KI of that IMSI. · The network generated a 128 bit random number (RAND) and sent it to the mobile station Over the air interface. · The MS calculates a SRES with the A3 algorithm using the given Challenge (RAND) and the KI residing in the SIM. At the same time, the network calculates the SRES using the same algorithm and the same Inputs. · The MS sends the SRES to the network, · The network test the SRES for validity. Encryption of the data : Encryption of the data Encrypted communication is initiated by a ciphering mode request command from the GSM network. The A5 algorithm used to encrypt the data The MS authentication is an optional procedure in the beginning of a call, but it is usually not performed. Other security features : Other security features Subscriber identity protection Smart card Overview of Cryptography : Overview of Cryptography Symmetric Algorithms Block Ciphers Stream Ciphers Problems with GSM Security : Problems with GSM Security Security by obscurity. Only provides access security. Difficult to upgrade the cryptographic mechanisms Lack of user visibility Conclusion : Conclusion Even if security algorithms were not broken, the GSM architecture would still be vulnerable to attacks from inside which means the attack targeting the operator’s backbone network However, the security can be improved in some areas with relatively simple measures.

Add a comment

Related presentations

Related pages

GSM Security and Encryption - Hack Canada

GSM Security and Encryption. by David Margrave, George Mason University 1.0 Introduction. The motivations for security in cellular telecommunications ...
Read more

GSM - Security and Encryption - Tutorialspoint

GSM Security - Learn European Mobile Communication Standard GSM basics along with billing concepts associated with GSM technology and GSM Mobile Phones.
Read more

GSM Security and Encryption -

GSM Security and Encryption - Download as Word Doc (.doc / .docx), PDF File (.pdf), Text File (.txt) or read online.
Read more

Security & Encryption in GSM , GPRS & CDMA - Scribd

Security and Encryption in GSM, GPRS, CDMA System. Abstract In any mobile system, it is important to send or receive or any kind of data in security ...
Read more


International Journal on Recent and Innovation Trends in Computing and Communication ISSN 2321 – 8169 Volume: 1 Issue: 1 ...
Read more

GSM Security - Inria

GSM Security Claude Castelluccia INRIA. Technology behind GSM • 900 MHz (or 1800 MHz) band • uplink frequency band 890-915 MHz • downlink frequency ...
Read more

A5/1 - Wikipedia, the free encyclopedia

A5/1 is a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard. It is one of seven algorithms which were ...
Read more