NexTech 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • UBICOMM 2021, The Fifteenth International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies
  • ADVCOMP 2021, The Fifteenth International Conference on Advanced Engineering Computing and Applications in Sciences
  • SEMAPRO 2021, The Fifteenth International Conference on Advances in Semantic Processing
  • AMBIENT 2021, The Eleventh International Conference on Ambient Computing, Applications, Services and Technologies
  • EMERGING 2021, The Thirteenth International Conference on Emerging Networks and Systems Intelligence
  • DATA ANALYTICS 2021, The Tenth International Conference on Data Analytics
  • GLOBAL HEALTH 2021, The Tenth International Conference on Global Health Challenges
  • CYBER 2021, The Sixth International Conference on Cyber-Technologies and Cyber-Systems

SoftNet 2021 Congress
October 03, 2021 to October 07, 2021 - Barcelona, Spain

  • ICSEA 2021, The Sixteenth International Conference on Software Engineering Advances
  • ICSNC 2021, The Sixteenth International Conference on Systems and Networks Communications
  • CENTRIC 2021, The Fourteenth International Conference on Advances in Human-oriented and Personalized Mechanisms, Technologies, and Services
  • VALID 2021, The Thirteenth International Conference on Advances in System Testing and Validation Lifecycle
  • SIMUL 2021, The Thirteenth International Conference on Advances in System Simulation
  • SOTICS 2021, The Eleventh International Conference on Social Media Technologies, Communication, and Informatics
  • INNOV 2021, The Tenth International Conference on Communications, Computation, Networks and Technologies
  • HEALTHINFO 2021, The Sixth International Conference on Informatics and Assistive Technologies for Health-Care, Medical Support and Wellbeing

NetWare 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • SENSORCOMM 2021, The Fifteenth International Conference on Sensor Technologies and Applications
  • SENSORDEVICES 2021, The Twelfth International Conference on Sensor Device Technologies and Applications
  • SECURWARE 2021, The Fifteenth International Conference on Emerging Security Information, Systems and Technologies
  • AFIN 2021, The Thirteenth International Conference on Advances in Future Internet
  • CENICS 2021, The Fourteenth International Conference on Advances in Circuits, Electronics and Micro-electronics
  • ICQNM 2021, The Fifteenth International Conference on Quantum, Nano/Bio, and Micro Technologies
  • FASSI 2021, The Seventh International Conference on Fundamentals and Advances in Software Systems Integration
  • GREEN 2021, The Sixth International Conference on Green Communications, Computing and Technologies

TrendNews 2021 Congress
November 14, 2021 to November 18, 2021 - Athens, Greece

  • CORETA 2021, Advances on Core Technologies and Applications
  • DIGITAL 2021, Advances on Societal Digital Transformation

 


ThinkMind // ICWMC 2014, The Tenth International Conference on Wireless and Mobile Communications // View article icwmc_2014_7_50_20153


Enhancement of A5/1 Stream Cipher Overcoming its Weakneses

Authors:
Mahdi Madani
Salim Chitroub

Keywords: GSM Networks; Stream Cipher; Mobile Security; Encryption and Cryptography; Cryptanalysis; Non-Linear Boolean Functions; Linear Feedback Shift Gegister.

Abstract:
The Global system for Mobile (GSM) communication is still the most widely used cellular system in the world, with over the billion customers around the world; even the fourth and fifth generations are now operated in some countries. However, GSM bears numerous security vulnerabilities and for that reason it has seriously considered security threats. Although GSMs architecture is designed in such a way to provide various security features like authentication, data and signaling confidentiality, and the user secrecy, the GSM channel is yet susceptible to replaying, interleaving and man-in-the-middle attacks. The GSM voice calls are encrypting a family of algorithms collectively called A5. A5/1 is the stream cipher which encrypts the information transmitted from a mobile user. Initially, A5 algorithm was kept secret to ensure the security, but us algorithm was disclosed many cryptanalytic attacks that have made in evidence the weakness of A5 algorithm. In this paper, after the discussion on the A5/1 encryption algorithm, and the attacks that it has suffered, we will put in evidence the weakness of A5/1. Although attacks that can be used to break the A5/1 algorithm require incredible computing power so that not only certain people with certain computer could break the A5/1 algorithm, however, this does not preclude the necessity of improve safety A5/1. We propose here to enhance the A5/1 stream cipher by overcoming its weakness.

Pages: 154 to 159

Copyright: Copyright (c) IARIA, 2014

Publication date: June 22, 2014

Published in: conference

ISSN: 2308-4219

ISBN: 978-1-61208-347-6

Location: Seville, Spain

Dates: from June 22, 2014 to June 26, 2014

SERVICES CONTACT
2010 - 2017 © ThinkMind. All rights reserved.
Read Terms of Service and Privacy Policy.