07-08-2011, 08:40 PM
please send me ppts on gsm security and encryption.
07-08-2011, 08:40 PM
please send me ppts on gsm security and encryption.
08-08-2011, 10:09 AM
hi
you can refer these pages to get the details on GSM SECURITY AND ENCRYPTION https://seminarproject.net/Thread-gsm-se...nar-report https://seminarproject.net/Thread-gsm-se...ort?page=2 https://seminarproject.net/Thread-gsm-se...ort?page=3 https://seminarproject.net/Thread-gsm-se...27#pid7027
23-07-2012, 01:00 PM
GSM SECURITY AND ENCRYPTION gsm security and encryption.pptx (Size: 409.76 KB / Downloads: 55) What is GSM? GSM stands for Global System for Mobile communication The GSM emerged in the early 1970’s The GSM is a circuit switched system that divides each 200KHZ channel into eight 25KHZ timeslots The GSM owns a market share of more than 70 % of the digital cellulor subscribers. Why GSM? International roaming Low-cost mobile sets and base stations High quality speech Compatability with integrated services digital network(ISDN) and other telephone company services Support for new services. GSM Brief history 1982 CEPT establishes a GSM group inorder to develop the standerds for a pan european cellulor mobile system 1987 Time Division Multiple Access (TDMA) is choosen as the access method 1988 GSM system is validated GSM security model The purpose of GSM security: The access to the mobile services. Any relavent item from being disclosed at the radio path,mainly inorder to ensure that. Privacy of user- related information. Security features of GSM Authentication of registered subscribers only. Secure data transfer through the use of encryption. Subscriber identity protection. Mobile phones are inoperable without a SIM. Duplicate SIM or not allowed in the network. The Authentication Procedure The mobile station send IMSI to the network. The network received IMSI and found corresponding KI of that IMSI. The network generated a 128 bit random number(RAND) and sent it to the mobile station over the air interface. The MS calculates a SRES with A3 algorithm using the given challenge(RAND) and KI residing in the SIM.At the same time networks calculates the SERS using the same algorithm and same inputs The MS sends SERS to the network The network test the SERS for the validity Encryption of the data Encrypted communication is initiated by a ciphering mode request command for the GSM network A5 algorithm used for encrypt the data The MS authentication is an optional procedure in the beginning of the call,but it is usually not performed |
|