The binary derivative has been used to measure the randomness of a binary string formed by a pseudorandom number generator for use in cipher systems. In this paper we develop statistical properties of the binary derivative and show that certain types of randomness testing in binary derivatives are e
Stream ciphers for GSM networks
โ Scribed by Chi-Chun Lo; Yu-Jen Chen
- Publisher
- Elsevier Science
- Year
- 2001
- Tongue
- English
- Weight
- 125 KB
- Volume
- 24
- Category
- Article
- ISSN
- 0140-3664
No coin nor oath required. For personal study only.
โฆ Synopsis
With the advance of wireless communications technology, mobile communications has become more convenient than ever. However, because of the openness of wireless communications, how to protect the privacy between communicating parties is becoming a very important issue. In this paper, we focus on the security of transferring voice message on the Global System for Mobile communication (GSM) networks. Stream cipher is recommended for message encryption and decryption. First, a key generator is presented. Then, on the basis of the key generator, stream ciphers are designed with respect to different levels of securities of GSM networks. Simulation results indicate that the key generator always produces key strings of evenly distributed 0's and 1's and with a very long period; i.e. it is very unlikely that repeated patterns will appear. Cryptanalysis and operational analysis show that the proposed stream ciphers are secure and efยฎcient; consequently, they provide a comprehensive set of message encryption/decryption algorithms for GSM networks.
๐ SIMILAR VOLUMES
The need for wireless communication systems has increased rapidly in the past few years and wireless communication has become more convenient in business and society. However, the air interface is vulnerable to eavesdropping, hence encryption in wireless communication systems is a necessity to keep
Video streaming over wireless links is a challenging issue due to the stringent Qualityof-Service (QoS) requirements of video traffic, the limited wireless channel bandwidth and the broadcast nature of wireless medium. As contention-based or reservation-based (i.e., contention-free) medium access co
## Abstract Various types of neural networks have been proposed in previous papers for applications in hydrological events. However, most of these applied neural networks are classified as static neural networks, which are based on batch processes that update action only after the whole training da