GSM SECURITY AND ENCRYPTION

Main Article Content

NIDHI GOEL, Dr. DEEPTI MEHROTRA

Abstract

the security mechanisms of GSM are implemented in three different system elements; the Subscriber Identity Module (SIM), the GSM handset or MS, and the GSM network. The SIM contains the IMSI, the individual subscriber authentication key (Ki), the ciphering key generating algorithm (A8), the authentication algorithm (A3), aswell as a Personal Identification Number (PIN). The GSM handset contains the ciphering algorithm (A5). The encryption algorithms (A3, A5, and A8) are present in the GSM network as well. The Authentication Center (AUC), part of the Operation and Maintenance Subsystem (OMS) of the GSM network, consists of a database of identification and authentication information for subscribers. This information consists of the IMSI, the TMSI, the Location Area Identity (LAI), and the individual subscriber authentication key (Ki) for each user. In order for the authentication and security mechanisms to function, all three elements (SIM, handset, and GSM network) are required. This distribution of security credentials and encryption algorithms provides an additional measure of security both in ensuring the privacy of cellular telephone conversations and in the prevention of cellular telephone fraud [4].

Article Details

How to Cite
, N. G. D. D. M. (2013). GSM SECURITY AND ENCRYPTION. International Journal on Recent and Innovation Trends in Computing and Communication, 1(1), 53–54. https://doi.org/10.17762/ijritcc.v1i1.2734
Section
Articles