ANALYSIS OF DIFFERENT ENCRYPTION STANDARDS ON GSM NETWORK Author

GSM (Global System for Mobile Communications, originally Groupe Special Mobile), is a standard set developed by the European Telecommunications Standards Institute (ETSI) to describe protocols for second generation (2G) digital cellular networks used by mobile phones. It became the de facto global standard for mobile communications with over 80% market share.It is a digital mobile telephony system that is widely used in Europe and other parts of the world. GSM is a cellular network, which means that cell phones connect to it by searching for cells in the immediate vicinity. There are five different cell sizes in a GSM network—macro, micro, pico, femto, and umbrella cells. The coverage area of each cell varies according to the implementation environment. GSM was designed with a moderate level of service security. The system was designed to authenticate the subscriber using a preshared key and challenge-response. Communications between the subscriber and the base station can be encrypted. The development of UMTS introduces an optional Universal Subscriber Identity Module (USIM), that uses a longer authentication key to give greater security, as well as mutually authenticating the network and the user, whereas GSM only authenticates the user to the network (and not vice versa). The security model therefore offers confidentiality and authentication, but limited authorization capabilities, and no nonrepudiation. In this paper a new approach to encryption has been proposed which includes extra encryption with AES, DES and Triple DES algorithm. This technique is much simpler than existing techniques thus a more robust and efficient system is achieved.

[1]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[2]  Aaron Earle Wireless Security Handbook , 2005 .

[3]  Songwu Lu,et al.  Securing a Wireless World , 2006, Proceedings of the IEEE.

[4]  Raphael C.-W. Phan Reducing the exhaustive key search of the Data Encryption Standard (DES) , 2007, Comput. Stand. Interfaces.

[5]  S.M. Siddique,et al.  Notice of Violation of IEEE Publication PrinciplesGSM Security Issues and Challenges , 2006, Seventh ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD'06).

[6]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[7]  P.Vander Arend Security Aspects and the Implementation in the GSM System , 1988 .