Retracted: Secure Conversation Using Cryptographic Algorithms in 3G Mobile Communication

Cryptographic algorithms used by Mobile Subscribers to protect the privacy of their cellular voice and data communication. Mobile network is the shared media. When media are shared, privacy and authentication are lost unless some method is established to regain it. Ciphering provides the mean to regain control over privacy and authentication. A5/x are the encryption algorithms used in order to ensure privacy of conversations on mobile phones. The strong version A5/1 is used in most countries. A5/2 is weaker version used in countries on which export restrictions apply. A5/3 encryption algorithm used for 3G and GEA3 encryption algorithm used for GPRS. f8 is confidentiality algorithms developed by 3GPP, bringing out the commonality between A5/3 and GEA3 algorithms. The following paper is based on simulation of A5/1, A5/3 and f8 algorithms.

[1]  C. E. Veni Madhavan,et al.  Recent Trends in Applied Cryptology , 2003 .

[2]  Raj Pandya,et al.  Mobile and Personal Communication Systems and Services , 1999 .

[3]  Fayyaz Ahmed,et al.  Cryptographic analysis of GSM networks , 2009, 6th International Bhurban Conference on Applied Sciences & Technology.

[4]  Li Wei,et al.  Research and Implementation of a High-Speed Reconfigurable A5 Algorithm , 2008, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application.

[5]  Tobias Martin,et al.  Security Mechanisms in UMTS , 2001, Datenschutz und Datensicherheit.

[6]  Vijay K. Garg,et al.  Wireless and Personal Communications Systems , 2000 .

[7]  Xu Huang,et al.  Protecting from Attacking the Man-in-Middle in Wireless Sensor Networks with Elliptic Curve Cryptography Key Exchange , 2010, 2010 Fourth International Conference on Network and System Security.

[8]  Musheer Ahmad,et al.  Enhanced A5/1 cipher with improved linear complexity , 2009, 2009 International Multimedia, Signal Processing and Communication Technologies.

[9]  Eli Biham,et al.  Cryptanalysis of the A5/1 GSM Stream Cipher , 2000, INDOCRYPT.

[10]  William Stallings,et al.  Cryptography and network security , 1998 .