๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

Stream ciphers for GSM networks

โœ Scribed by Chi-Chun Lo; Yu-Jen Chen


Publisher
Elsevier Science
Year
2001
Tongue
English
Weight
125 KB
Volume
24
Category
Article
ISSN
0140-3664

No coin nor oath required. For personal study only.

โœฆ Synopsis


With the advance of wireless communications technology, mobile communications has become more convenient than ever. However, because of the openness of wireless communications, how to protect the privacy between communicating parties is becoming a very important issue. In this paper, we focus on the security of transferring voice message on the Global System for Mobile communication (GSM) networks. Stream cipher is recommended for message encryption and decryption. First, a key generator is presented. Then, on the basis of the key generator, stream ciphers are designed with respect to different levels of securities of GSM networks. Simulation results indicate that the key generator always produces key strings of evenly distributed 0's and 1's and with a very long period; i.e. it is very unlikely that repeated patterns will appear. Cryptanalysis and operational analysis show that the proposed stream ciphers are secure and efยฎcient; consequently, they provide a comprehensive set of message encryption/decryption algorithms for GSM networks.


๐Ÿ“œ SIMILAR VOLUMES


Testing for randomness in stream ciphers
โœ Neville Davies; Ed Dawson; Helen Gustafson; A. N. Pettitt ๐Ÿ“‚ Article ๐Ÿ“… 1995 ๐Ÿ› Springer US ๐ŸŒ English โš– 391 KB

The binary derivative has been used to measure the randomness of a binary string formed by a pseudorandom number generator for use in cipher systems. In this paper we develop statistical properties of the binary derivative and show that certain types of randomness testing in binary derivatives are e

An efficient cryptosystem Delta for stre
โœ Ali A. Kanso ๐Ÿ“‚ Article ๐Ÿ“… 2009 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 298 KB

The need for wireless communication systems has increased rapidly in the past few years and wireless communication has become more convenient in business and society. However, the air interface is vulnerable to eavesdropping, hence encryption in wireless communication systems is a necessity to keep

QoS control for streaming service in UMT
โœ Yalou Wang; Tony Putman; Nidal N. Khrais; Ching-Roung Chou; Gopal Kumar; Freddy ๐Ÿ“‚ Article ๐Ÿ“… 2007 ๐Ÿ› Institute of Electrical and Electronics Engineers ๐ŸŒ English โš– 383 KB ๐Ÿ‘ 2 views
Resource management for video streaming
โœ Ruonan Zhang; Lin Cai; Jianping Pan; Xuemin (Sherman) Shen ๐Ÿ“‚ Article ๐Ÿ“… 2011 ๐Ÿ› Elsevier Science ๐ŸŒ English โš– 867 KB

Video streaming over wireless links is a challenging issue due to the stringent Qualityof-Service (QoS) requirements of video traffic, the limited wireless channel bandwidth and the broadcast nature of wireless medium. As contention-based or reservation-based (i.e., contention-free) medium access co

Real-time recurrent learning neural netw
โœ F.-John Chang; Li-Chiu Chang; Hau-Lung Huang ๐Ÿ“‚ Article ๐Ÿ“… 2002 ๐Ÿ› John Wiley and Sons ๐ŸŒ English โš– 148 KB

## Abstract Various types of neural networks have been proposed in previous papers for applications in hydrological events. However, most of these applied neural networks are classified as static neural networks, which are based on batch processes that update action only after the whole training da