Securing SMS of a GSM Network Message Center Using Asymmetric Encryption Technique Algorithm.
|
|
- Neal Shields
- 6 years ago
- Views:
Transcription
1 Securing SMS of a GSM Network Message Center Using Asymmetric Encryption Technique Algorithm. Garba S. (1), Abdu-Aguye U.-F., Raubilu A.A., Ibrahim Y. Department of Electrical and Computer Engineering, Ahmadu Bello University, Zaria. (1) sgarba@abu.edu.ng, sgarbaabu@gmail.com Abstract Asymmetric encryption techniqueswas successfully incorporated in a Network Message Centre (NMS) to address insecurity of the SMS (Short Message Service) in a GSM network. The Network Message Centre (NMS)was design using MYSQL, PHP, HTML and CSS which serves as GUI (Graphic User Interface) and the Asymmetric algorithm was incorporated into the application for encryption/decryption of SMS using public and private key respectively.a modulus size of 1248 bits, with cipher text of 156 characters were used on the Asymmetric algorithms to achieved optimal payload. The secure SMS undergo three (3) stages; compression, encryption, and decryption. The SMS was implemented under the aforementioned stages. The NMS runs successfully after incorporating the Asymmetric Encryption technique under the design specifications. Keywords: SMS, GSM, Encryption, Compression, Decryption, NMS. 1.0 Introduction In recent times, mobile communication devices are integrated with multiple wireless network technologies to support additional functionality and services. One of the most important developments that have emerged from communication technology is Short Message Service (SMS). An integral part of Global System for Mobile Communications (GSM), but is now available on a wide range of network standards such as Code Division Multiple Access (CDMA) (1). SMS was originally meant to notify users of their voic message, it has now become a popular means of communication by individuals and businesses. Banks worldwide are using SMS to conduct some of their banking services. E.g. clients are able to query their balances via SMS or conduct mobile payment or an alert by banks to notify customers about the transaction they made.sms are transmitted within or outside the same cell or to anyone with roaming capabilities. The SMS is a store and forward service, and is not sent directly but delivered via an SMS Centre (SMSC).SMSC is a network element in the mobile telephone network, in which SMS is stored until the destination device becomes available (1) (2). The SMS messages do not require the mobile phone to be active and within range, as they will be held for a period of time until the phone is active over the air interface. The security feature Over the Air interface and those present in the GSM fixed network are independent of each other. The network security feature do not continue past the Base Transceiver Station (BTS). This contrasts to the air interface which is a medium accessible by anyone with right air interface equipment available to them. This makes the SMS technology vulnerable to risk and unauthorized access, as such, the integrity of SMSs needs to be preserved (3). An alternative to protect data privacy in SMS message involves encrypting the message body at the sending device and decrypting the message at the receiving. Such anapproach protects the data for the entire duration of its transit through the network, although such an 557
2 implementation of such a system is highly task demanding (4). In order to be in agreement with the all flavours of SMS, the encryption algorithms must possess three attributes, namely(3): i. The encrypted message must be in the form of cipher text or plain text in order to meet the SMS message body standard. ii. The encryption algorithms cannot alter the size of the original message, since that would course initially large messages to exceed the maximum allowed size after encryption. iii. Simple and computationally inexpensive. In cryptography, a key agreement is a protocol whereby the two parties (i.e. encryption and decryption at sender and receiver respectively) can agree on a key in such a way that both influence outcome (5). If properly done, this precludes undesired third parties from forcing a key choice on agreeing parties. Protocols that are useful in practice also do not reveal to any eavesdropping party what key has been agreed upon on (6). Reliable encryption and decryption techniques is the process of converting information into a special code so that it is intelligible only to someone who knows how to convert it into plain text (7). 2.0 Algorithm Types Many different algorithms are used for encryption but contain elements common to all of them. Algorithms can be divided into two (2) classes, depending on the technique and approach employed. They are (5): i. Symmetric. ii. Asymmetric. i. Symmetric Algorithm Symmetric algorithms use the same key for encryption and decryption data. They usually operate at relatively high speed and are suitable for large/bulk encryption of message (7). ii. Asymmetric Algorithm This is a special class of transformations in engineering, where a pair of related independent keys can be used to perform asymmetric encryption and decryption. One key from the pair is used to encrypt the message into cipher, and the other key decryption key is used to generate the plain text (known as RSA, after its developers Rivers, Shamir and Adelman) (7). 3.0 Mobile Station and Subsystems The mobile station (MS) consists of Mobile Equipment (ME) and Subscriber Identity Module (SIM) which store secret information which includes International Mobile Subscriber Identity (IMSI), and secret key (KI) for authentication. SIM provide personal mobility, so that the user can have access to subscribed services irrespective of a specific terminal. The user is able to receive and make calls at the terminal (2). In the base station subsystem (BSS), the radio network controls the radio link and provide a radio interface for the rest of the network. It consists of two types of nodes; Base Station Controller (BSC) and Base Transceiver Station (BTS). The BTS covers a specific geographical area which is called a cell. Each cell comprises of many mobile station. The BSC controls 558
3 several base stations by managing their radio resources. The BSC is connected to Mobile services Switching Centre (MSC) in the third part of the network. The network system subsystem (NSS) also called the Core Network (CN) In addition to MSC consists of several other databases such as Visitor Location Register (VLR), Home Location Register (HLR) and Gateway MSC (GMSC) which connect the GSM network to public Switched Telephone Network (PSTN). The MSC, in cooperation with HLR and VLR provide numerous function including registration, authentication, location updating and call routing (2) (3). 4.0 Methodology i. Creating a database using MYSQL which will serve as the container for SMS (Short Message Service) sent/received. ii. Designing a dynamic web based application using HTML and PHP and applying styles and side script to the application using CSS and JS. iii. Incorporating the asymmetric encryption technique using RSA Algorithm iv. Testing and analyzing the application 5.0 System Flow Chart A home screen is displayed when the application starts, which is an introduction to the message centre. A login forms follows for authentications (username and password required) before access is guaranteed. Subsequently, allowing access to SMS informations. Provision is created for ending a user session. The system flow chart is shown in Figure 1. Figure 1: System flow chart Figures 2, 3, and 4 shows the designed administrator and user login forms, and success page. 559
4 Figure 2: Administrator log in form Figure 3: User login form Figure 3: Success page 6.0 Design Specification for the Asymetric Algorithm The message centre is developed using a single Database which contains four (4) relation (tables), and stored data in each table. They are: i. The subscriber table that stored the data about each subscribers. ii. The data vault table. 560
5 iii. iv. The Administrator table that stored the admin user login. The Users table that stored the user login details. The database has key bank where the public and private keys are stored and a data vault where the query is being passed. The proposed message centre comprised of seven (5) interface forms of different functionality and has the ability of accessing the database in order to retrieve, query and delete information from the database. These interface forms include the following: i. HOME SCREEN. ii. THE LOG_IN FORM (1). iii. THE LOG_IN FORM (2). iv. THE SEND_SMS FORM. v. THE ADD_NEW_SUBSCRIBER FORM. vi. THE ENCRYPT FORM. vii. USERS FORM. The simulated enhanced message centre developed provides the mobile network organizations with the ability to prevent internal fraud, espionage and conspiracy. It prevents easy access to subscriber s text message for infamous motives by having the following properties: a) Identification of the message centre system structure. b) Authentication relation. c) Simulated SMS interface and Data vault. d) Concrete method encryption. e) Flexibility of decryption to authorized personnel 7.0 The Technique for Securing The SMS The SMS is secure without increasing its length. The two main steps of this technique are the compression and encryption processes (8). The SMS is compressed (processes of encoding) using fewer bits than an un-encoded representation. The purpose of this step is to reduce the consumption of resources and reducing SMS length. The SMS is the encrypted, that is achieving security by encoding the messages to make them non readable. The steps of the technique can be described as follows: Step 1: Get the SMS Step 2: Determine the SMS recipient Step 3: Compress the SMS Step 4: Check the compressed SMS length 4.1: If it is greater than 145 characters then divide it into more than one according to its length such that each message is 145 characters to satisfy the message length limit. Step 5: Encrypt the compressed SMS using Asymmetric algorithm. Step 6: Add signature to the SMS. Step 7: Send the SMS. 561
6 In Step 4, restricting the SMS length in the proposed technique to 145 characters is necessary for the encryption process. Table 1 Indicates the relation between RSA Modulus (Asymmetric) bits, maximum number of Input characters and length of output encrypted characters. Table 1: The relation between RSA Modulus bits, maximum number of Input characters and length of output encrypted characters. RSA Number of Length of Modules size (bits) input characters Range output encrypted character Based Table 1, the RSA Modulus size chosen is 1248 bits as optimal value, that gives an output cipher text of 156 characters and the maximum input characters will be 145. The standard SMS length is 160 characters (8). In step 5, encrypting the SMS is based on RSA algorithm. The encryption using this algorithm can be achieved as follows: Step 1: choosing two large prime numbers P and Q Step 2: Calculating N (8), N=P*Q (1) Step 3: Selecting the public key (i.e. the encryption key) E, such that it is not a factor of (P-1) and (Q-1). Step 4: Selecting the private key (i.e. the decryption key) D, such that the following equation is true (D*E) mod (8): (P-1) * (Q-1) =1 (2) Step 5: For encryption, the cipher text is calculated using the plain text PT as (8): CT=PT^E mod N (3) Step 6: Sending CT as the cipher text to the receiver Step 7: For decryption, the plain text PTis calculated from the cipher text CT as (8): PT=CT^D mod N (4) 8.0 GSM Authentication and Identification The Subscriber Identity Module (SIM) is a smart card which contains both programming and information. The SIM plays an important role in identifying a user and is placed in a Mobile Station (MS) slot (2). This card is issued by the network operator and contains two sorts of information namely USER-DATA and NETWORK-DATA. One of the pieces of information is 562
7 the International Mobile Subscriber Identity (IMSI) which is stored securely within the SIM under NETWORK-DATA. This is the unique number assigned to each GSM Mobile user and is up to 15 digits. When a user switches on his/her Mobile devices, the International Mobile Subscriber Identity (IMSI) is used for connection to the network. The initial connection is the only time the IMSI is used, as after the connection the network assigns the user a random Temporary Mobile Subscriber Identity (TMSI), thus hiding a user s true identity. The TMSI has local purpose, as the temporary is valid only for a specific area. If the user moves to another area, the network allocates the user a new TMSI. When a new TMSI is allocated to a MS, it is transmitted to the MS in a cipher text. The MS stores the TMSI on SIM card so that when the MS is switched off then this data is not lost. The TMSI is also stores at the VLR and not at the HLR and consist of up to 32 bits (4 octets). The main purpose of the TMSI is to retain the anonymity of the Subscriber since the IMSI can reveal the user s true identity. The IMSI consist of three parts, namely (1): a) Mobile Country Code (MCC) 3 decimal digits. b) Mobile Network Code (MNC) 2 decimal digits. c) Mobile Subscriber Identification Number (MSIN) 10 decimal digits. The MSIN is unique for a MCC/MNC combination. (N.J Croft and M.S Oliver, (2005)). 9.0 Security Implementation The security implementation is based on public-key encryption and a simulated interface, such that every new and existing subscriber is allocated a unique mobile number (public-key) and private-key. Step1; A GSM user types his text message into the SMS interface, the intended recipient s number and his own corresponding number. After the send button is pressed; the text message is automatically encrypted and sends to the data vault. Step2; In order for authorized personnel to access the message for a subscriber, a legal password must be inputted, which grants access to the main menu otherwise access denied. This is achieved by comparing the subscriber s SIM certificate data with the information in the database. If the information in the SIM certificate corresponds with the information in the database then step 3. Step3: The SMS message of the subscriber would immediately appear the access window. 5.1 Conclusions Asymmetric encryption techniques using public and private key was successfully developed to address insecurity of the SMS (Short Message Service) in a GSM network. The application runs successfully under the design specification. The SMS was successfully encrypted from the application locally on a system. 563
8 References P. Traynor, W. Enck, P. McDaniel and T. La Porta. (2009). Mitigating Attacks on Open Functionalityin SMS-Capable Cellular Networks. IEEE/ACM Transactions on Internet Networking. 17(1), pp GSM document (2009). Short Message Service. Available: N. Croft and M. Olivier (2005). Using an approximated One Time Pad to Secure Short MessagingService (SMS). Proceedings of the Southern African Telecommunication Networks and Applications Conference. South Africa Pp per.pdf. B. Schneier (1996). Applied Cryptography: Protocols, Algorithms and SourceCode in C. Wiley Computer Publishing, John Wiley and Sons, Inc. pp Parliamentary Office of Science and Technology (POST) (2006). Data encryption POSTnote.Number 270. Rivest, Sharmir, Adleman (RSA) (1978).A method for obtaining digital signatures and publickey cryptosystems. Communication OS of the ACM K. M. Alallayah, W. F. Abd El-Wahed (2010). Attack of Against Simplified Data Encryption Standard Cipher System Using Neural Networks.Journal of Computer Science 6 (1): pp 29-35, ISSN
Hybrid Compression Encryption Technique for Securing SMS
Hybrid Compression Encryption Technique for Securing SMS Tarek M. Mahmoud Faculty of science/ Department of Computer Science Minia University El Minia, Egypt Bahgat A. Abdel-latef Faculty of science/ Department
More informationGLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017
GLOBAL SYSTEM FOR MOBILE COMMUNICATION (2) ETI2511 Friday, 31 March 2017 1 SYLLABUS GSM General architecture and interfaces of cellular system and the PSTN and Internet networks: BTS, MSC, Internetworking,
More informationChapter 3 GSM and Similar Architectures
CSF645 Mobile Computing 行動計算 Chapter 3 GSM and Similar Architectures 吳俊興 國立高雄大學資訊工程學系 Chapter 3 GSM and Similar Architectures 3.1 GSM Services and System Architecture 3.2 Radio Interfaces 3.3 Protocols
More informationBasics of GSM in depth
This document will be helpful for the telecom engineers who deal with GSM as well as for the fresher /interested readers. This document has some advantages over other GSM texts in that it quickly gets
More informationCellular Mobile Systems and Services (TCOM1010) GSM Architecture
GSM Architecture 1 GSM NETWORK INFRASTRUCTURE...2 2 NETWORK SWITCHING SUBSYSTEM (NSS)...3 2.1 Home Location Register...4 2.2 Mobile Switching Center and Visitor Location Register...4 2.3 Authentication
More informationPertemuan 7 GSM Network. DAHLAN ABDULLAH
Pertemuan 7 GSM Network DAHLAN ABDULLAH Email : dahlan.unimal@gmail.com Contents GSM-Introduction Architecture Technical Specification & Operation Frame Structure Channels Call Routing Security Characteristics
More informationSecurity of Cellular Networks: Man-in-the Middle Attacks
Security of Cellular Networks: Man-in-the Middle Attacks Mario Čagalj University of Split 2013/2014. Security in the GSM system by Jeremy Quirke, 2004 Introduction Nowadays, mobile phones are used by 80-90%
More informationSecure and Authentication Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography.
Secure and Authentication Communication in GSM, GPRS, and UMTS Using Asymmetric Cryptography T K Mohanta 1, R K Samantaray 2, S Panda 3 1. Dept.of Electronics & Communication.Engg, Sudhananda Engg & Research
More information10 Call Set-up. Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up.
10 Call Set-up Objectives After this chapter the student will: be able to describe the activities in the network during a call set-up. 10.1 INTRODUCTION... 2 10.2 CALL TO MS (MT)... 3 10.3 CALL FROM MS
More informationInformation Technology Mobile Computing Module: GSM Handovers
Information Technology Mobile Computing Module: GSM Handovers Learning Objectives Recap of previous modules Basic functions of Network Sub System Entities that form NSS namely MSC,GMSC,HLR and VLR Functions
More informationEUROPEAN ETS TELECOMMUNICATION November 1996 STANDARD
EUROPEAN ETS 300 522 TELECOMMUNICATION November 1996 STANDARD Third Edition Source: ETSI TC-SMG Reference: RE/SMG-030302PR2 ICS: 33.020 Key words: Digital cellular telecommunications system, Global System
More informationCommunication Networks 2 Signaling 2 (Mobile)
Communication Networks 2 Signaling 2 (Mobile) Gusztáv Adamis BME TMIT 2017 GSM signaling Signaling of GSM is based on the ISDN signaling systems SS7/DSS1 But, because of mobility, roaming, radio access
More informationDesign of a Routing Mechanism to Provide Multiple Mobile Network Service on a Single SIM Card Boobalan. P, Krishna. P, Udhayakumar. P, Santhosh.
Design of a Routing Mechanism to Provide Multiple Mobile Network Service on a Single SIM Card Boobalan. P, Krishna. P, Udhayakumar. P, Santhosh. A Abstract-The current scenario in mobile networks is that
More informationSecurity functions in mobile communication systems
Security functions in mobile communication systems Dr. Hannes Federrath University of Technology Dresden Security demands Security functions of GSM Known attacks on GSM Security functions of UMTS Concepts
More informationDesigning Authentication for Wireless Communication Security Protocol
Designing Authentication for Wireless Communication Security Protocol Ms. Roshni Chandrawanshi, Prof. Ravi Mohan, Mr. Shiv Prakash Chandrawanshi Abstract Security is considered an important issue for mobile
More informationSECURE SHORT MESSAGE PEER-TO-PEER PROTOCOL
International Journal of Electronic Commerce Studies Vol.3, No.1, pp.45-60, 2012 SECURE SHORT MESSAGE PEER-TO-PEER PROTOCOL Saurabh Samanta National Institute of Technology Karnataka Surathkal, Srinivasnagar
More informationComputers and Security
The contents of this Supporting Material document have been prepared from the Eight units of study texts for the course M150: Date, Computing and Information, produced by The Open University, UK. Copyright
More informationCellular Communication
Cellular Communication Cellular Communication Cellular communication is designed to provide communications between two moving units, or between one mobile unit and one stationary phone or land unit (PSTN).
More informationTechnical description of international mobile roaming May 2010
Technical description of international mobile roaming May 2010 Prepared by the Ministry of Economic Development of New Zealand and the Department of Broadband, Communications and the Digital Economy of
More informationGSM Hacking. Wireless Mobile Phone Communication 30 th January 2014 UNRESTRICTED EXTERNAL
GSM Hacking Wireless Mobile Phone Communication 30 th January 2014 Labs.mwrinfosecurity.com MWR Labs 1 Labs.mwrinfosecurity.com MWR Labs Introduction to GSM June 2008 2.9 BILLION subscribers use GSM. Replaced
More informationContents. GSM and UMTS Security. Cellular Radio Network Architecture. Introduction to Mobile Telecommunications
Royal Holloway, University of London, IC3 Network Security, 13 November 2006 Contents GSM and UMTS Security Introduction to mobile telecommunications Second generation systems - GSM security Third generation
More informationInternal. GSM Fundamentals.
Internal GSM Fundamentals www.huawei.com HUAWEI TECHNOLOGIES CO., LTD. All rights reserved Chapter 1 GSM System Overview Chapter 2 GSM Network Structure Chapter 3 Service Area and Number Planning Chapter
More informationGSM. Course requirements: Understanding Telecommunications book by Ericsson (Part D PLMN) + supporting material (= these slides) GPRS
GSM Example of a PLMN (Public Land Mobile Network) At present most successful cellular mobile system (over 200 million subscribers worldwide) Digital (2 nd Generation) cellular mobile system operating
More informationCHAPTER 4 SYSTEM IMPLEMENTATION 4.1 INTRODUCTION
CHAPTER 4 SYSTEM IMPLEMENTATION 4.1 INTRODUCTION The most important part of any project i.e., implementation. It describes the various functionalities step by step under each module with their outputs.
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN
7 Location Management Strategies in Mobile Networks Vivek Kumar Department of Computer Science & Engineering Graphic Era University, Dehradun, INDIA vivekror7@gmail.com Narayan Chaturvedi Department of
More informationNetwork Security: Cellular Security. Tuomas Aura T Network security Aalto University, Nov-Dec 2013
Network Security: Cellular Security Tuomas Aura T-110.5241 Network security Aalto University, Nov-Dec 2013 Outline Cellular networks GSM security architecture and protocols Counters UMTS AKA and session
More informationTelemetry Data Sharing Using S/MIME
Telemetry Data Sharing Using S/MIME Item Type text; Proceedings Authors Kalibjian, Jeffrey R. Publisher International Foundation for Telemetering Journal International Telemetering Conference Proceedings
More informationUNIT-5. GSM System Operations (Traffic Cases) Registration, call setup, and location updating. Call setup. Interrogation phase
UNIT-5 GSM System Operations (Traffic Cases) Registration, call setup, and location updating Call setup Interrogation phase For the interrogation phase The initial address message comes outside the GSM
More informationPractical Operator Considerations Cellular Analog Cellular Rogue Base Station Tumbling Cloning
Practical Operator Considerations Cellular Analog Cellular Rogue Base Station Tumbling Cloning Getting paid Prevent (limit) subscriber fraud Ensure accurate clearing with other operators Reduce churn Ensure
More informationPublic Key Cryptography
graphy CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L07, Steve/Courses/2011/S2/CSS322/Lectures/rsa.tex,
More informationPublic Key Algorithms
Public Key Algorithms 1 Public Key Algorithms It is necessary to know some number theory to really understand how and why public key algorithms work Most of the public key algorithms are based on modular
More informationIntegration of voice and data in an m-commerce situation
Integration of voice and data in an m-commerce situation Master Thesis 26 January, 2001 Fredrik Oljeqvist d96-fol@nada.kth.se Assignor Examiner Academic supervisor Industrial supervisor Benefactor Location
More informationCity Research Online. Permanent City Research Online URL:
Komninos, N. & Dimitriou, T. (2006). Adaptive authentication and key agreement mechanism for future cellular systems. Paper presented at the 15th IST Mobile & Wireless Communications Summit, 04-08 June
More informationGSM System Overview. Ph.D. Phone Lin.
GSM System Overview Phone Lin Ph.D. Email: plin@csie.ntu.edu.tw 1 Outlines Introduction GSM Architecture Location Tracking and Call Setup Security GSM Data Services Unstructured Supplementary Service Data
More informationE2-E3: CONSUMER MOBILITY. CHAPTER-5 CDMA x OVERVIEW (Date of Creation: )
E2-E3: CONSUMER MOBILITY CHAPTER-5 CDMA 2000 1x OVERVIEW (Date of Creation: 01-04.2011) Page: 1 CDMA 2000 1X Overview Introduction CDMA (code division multiple access) is a mobile digital radio technology
More informationCryptography and Network Security. Sixth Edition by William Stallings
Cryptography and Network Security Sixth Edition by William Stallings Chapter 9 Public Key Cryptography and RSA Misconceptions Concerning Public-Key Encryption Public-key encryption is more secure from
More informationKey Exchange. Secure Software Systems
1 Key Exchange 2 Challenge Exchanging Keys &!"#h%&'() & & 1 2 6(6 1) 2 15! $ The more parties in communication, the more keys that need to be securely exchanged " # Do we have to use out-of-band methods?
More informationNetwork Security Issues and Cryptography
Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi
More informationMobility and Security Management in the GSM System
IOSR Journal of Engineering (IOSRJEN) ISSN: 2250-3021 ISBN: 2878-8719 PP 13-18 National Symposium on engineering and Research Mobility and Security Management in the GSM System 1 Mr. Yogesh S. Amle 2 Mr.
More informationSequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation
Sequenced Release of Privacy Accurate Call Data Record Information in a GSM Forensic Investigation N.J Croft and M.S Olivier May 2006 Information and Computer Security Architectures Research Group Department
More informationMobile Communications
Mobile Communications 3GPP Public Land Mobile Networks: GSM, GPRS Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 What is the architecture of the GSM network network elements, interfaces,
More informationShort Message Service (SMS)
TECQUI Ayra M.-B. Short Message Service (SMS) Introduction Short message service is a mechanism of delivery of short messages over the mobile networks. It is a store and forward way of transmitting messages
More informationRashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,
SMS Encryption Rashmi P. Sarode *, Neeraj Manglani Department of Computer Science Jagan Nath University, Jaipur, India Abstract In the application of Computer Science, the performance of classification
More information06/02/ Local & Metropolitan Area Networks. 0. Overview. Terminology ACOE322. Lecture 8 Network Security
1 Local & Metropolitan Area Networks ACOE322 Lecture 8 Network Security Dr. L. Christofi 1 0. Overview As the knowledge of computer networking and protocols has become more widespread, so the threat of
More informationDiminishing Signaling Traffic for Authentication in Mobile Communication System
Diminishing Signaling Traffic for Authentication in Mobile Communication System Chi-Chun Lo and Kuen-Liang Sue Institute of Information Management National Chiao Tung University Hsinchu, Taiwan cclo@cc.nctu.edu.tw,
More informationUMTS System Architecture and Protocol Architecture
UMTS System Architecture and Protocol Architecture Overview on overall system architecture UMTS network architecture and elements Mobile station High-level functions UMTS domains and strata UMTS/GPRS protocol
More informationEnhanced Asymmetric Public Key Cryptography based on Diffie-Hellman and RSA Algorithm
Enhanced Asymmetric Public Key Cryptography based on Diffie-Hellman and RSA Algorithm Princess Arleen S Zamora Gaduate Programs, Technological Institute of the Philippines Quezon City 1901, Philippines
More informationCryptography MIS
Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message
More informationCOSC : mobility within same subnet. Lecture 26. H1 remains in same IP subnet: IP address can remain same
Lecture 26 802.11: mobility within same subnet H1 remains in same IP subnet: IP address can remain same switch: which AP is associated with H1? self learning (Ch. 5): switch will see frame from H1 and
More informationTECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET. Bornholm, October 2003
Electronic Communications Committee (ECC) within the European Conference of Postal and Telecommunications Administrations (CEPT) TECHNICAL BRIEFING: MOBILE ACCESS TO THE INTERNET Bornholm, October 2003
More informationDistributed Systems. 26. Cryptographic Systems: An Introduction. Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 26. Cryptographic Systems: An Introduction Paul Krzyzanowski Rutgers University Fall 2015 1 Cryptography Security Cryptography may be a component of a secure system Adding cryptography
More informationChapter 9. Public Key Cryptography, RSA And Key Management
Chapter 9 Public Key Cryptography, RSA And Key Management RSA by Rivest, Shamir & Adleman of MIT in 1977 The most widely used public-key cryptosystem is RSA. The difficulty of attacking RSA is based on
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationCryptography. Cryptography is much more than. What is Cryptography, exactly? Why Cryptography? (cont d) Straight encoding and decoding
Copyright 2000-2001, University of Washington Cryptography is much more than Cryptography Cryptography systems allow 2 parties to communicate securely. The intent is to give privacy, integrity and security
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationETSI TS V7.1.0 ( )
TS 100 522 V7.1.0 (2000-02) Technical Specification Digital cellular telecommunications system (Phase 2+); Network architecture (GSM 03.02 version 7.1.0 Release 1998) GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS
More informationkey distribution requirements for public key algorithms asymmetric (or public) key algorithms
topics: cis3.2 electronic commerce 24 april 2006 lecture # 22 internet security (part 2) finish from last time: symmetric (single key) and asymmetric (public key) methods different cryptographic systems
More informationLECTURE 4: Cryptography
CSC 519 Information Security LECTURE 4: Cryptography Dr. Esam A. Alwagait alwagait@ksu.edu.sa Recap form previous Lecture We discussed more symmetric encryption. Books? Security Engineering, Ross Anderson
More informationSemi-Active GSM Monitoring System SCL-5020SE
Semi-Active GSM Monitoring System SCL-5020SE Technology Introduction: GSM networks are most popular and widespread wireless communication media across the world, having a wide customer base in Europe and
More informationVerteilte Systeme (Distributed Systems)
Verteilte Systeme (Distributed Systems) Lorenz Froihofer l.froihofer@infosys.tuwien.ac.at http://www.infosys.tuwien.ac.at/teaching/courses/ VerteilteSysteme/ Security Threats, mechanisms, design issues
More informationThe Application of Elliptic Curves Cryptography in Embedded Systems
The Application of Elliptic Curves Cryptography in Embedded Systems Wang Qingxian School of Computer Science and Engineering University of Electronic Science and Technology China Introduction to Cryptography
More informationDistributed Systems. Lecture 14: Security. Distributed Systems 1
06-06798 Distributed Systems Lecture 14: Security Distributed Systems 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication
More informationMobility: vocabulary
What is mobility? spectrum of mobility, from the perspective: no mobility high mobility mobile wireless user, using same access point mobile user, connecting/ disconnecting from using DHCP. mobile user,
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationDistributed Systems. Lecture 14: Security. 5 March,
06-06798 Distributed Systems Lecture 14: Security 5 March, 2002 1 What is security? policies and mechanisms threats and attacks Overview Security of electronic transactions secure channels authentication
More informationPublic Key Cryptography and RSA
Public Key Cryptography and RSA Major topics Principles of public key cryptosystems The RSA algorithm The Security of RSA Motivations A public key system is asymmetric, there does not have to be an exchange
More informationPORTABLE communication systems (PCSs) do not require
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 4, NO. 1, JANUARY 2005 57 A New Delegation-Based Authentication Protocol for Use in Portable Communication Systems Wei-Bin Lee and Chang-Kuo Yeh Abstract
More informationWireless Communications
Wireless Communications Lecture 6: Mobility Management Module Representive: Prof. Dr.-Ing. Hans D. Schotten schotten@eit.uni-kl.de Lecturer: Dr.-Ing. Bin Han binhan@eit.uni-kl.de Institute of Wireless
More informationBCA III Network security and Cryptography Examination-2016 Model Paper 1
Time: 3hrs BCA III Network security and Cryptography Examination-2016 Model Paper 1 M.M:50 The question paper contains 40 multiple choice questions with four choices and student will have to pick the correct
More informationSection 4 GSM Signaling BSSMAP
Section 4 GSM Signaling BSSMAP BSS management messages (BSSMAP) between MSC and BSS (BSC/ BTS), which are necessary for resource management, handover control, paging order etc. The BSSMAP messages can
More informationPublic-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7
Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:
More informationPrinciples of Information Security, Fourth Edition. Chapter 8 Cryptography
Principles of Information Security, Fourth Edition Chapter 8 Cryptography Learning Objectives Upon completion of this material, you should be able to: Chronicle the most significant events and discoveries
More informationGPRS and UMTS T
GPRS and UMTS T-110.2100 Global Packet Radio Service GPRS uses the time slots not used for circuit switched services Data rate depends on the availability of free time slots GPRS uses the multislot technique,
More informationWireless and Mobile Network Architecture
Wireless and Mobile Network Architecture Chapter 8: GSM Mobility Management Prof. Yuh-Shyan Chen Department of Computer Science and Information Engineering National Taipei University Nov. 2006 1 Outline
More information1.264 Lecture 28. Cryptography: Asymmetric keys
1.264 Lecture 28 Cryptography: Asymmetric keys Next class: Anderson chapters 20. Exercise due before class (Reading doesn t cover same topics as lecture) 1 Asymmetric or public key encryption Receiver
More informationInternational Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: Volume 1 Issue 6 (July 2014)
HOME APPLIANCE CONTROL FOR USERS WITH MOTOR DISABILITIES USING SMART PHONE Shruthi.J 1, Ramya.S 2, Bharathi.R 3 Department of Computer Science and Engineering, BMSIT, Bangalore-64 Abstract In our surroundings,
More informationCOMP327 Mobile Computing Session: Lecture Set 5 - Wireless Communication Part 2
COMP327 Mobile Computing Session: 2016-2017 Lecture Set 5 - Wireless Communication Part 2 51 SIM (Subscriber Identity Modules) Smart cards that are inserted into the GSM phone to identify the user Stores
More informationChapter 3 Public Key Cryptography
Cryptography and Network Security Chapter 3 Public Key Cryptography Lectured by Nguyễn Đức Thái Outline Number theory overview Public key cryptography RSA algorithm 2 Prime Numbers A prime number is an
More informationThreat patterns in GSM system. Basic threat patterns:
Threat patterns in GSM system Usage of mobile devices in business simpli es, speeds up and optimizes business processes. However, it is necessary to understand that the more complicated the device is the
More informationSniffer. J.DEEPTHI Associate Professor & HOD, Department of CSE,
EDULAKANTI KAVYA B.Tech Student, Department of CSE, Sphoorthy Engineering College, Nadergul(Vill), Sagar Road, Saroonagar(Mdl),R.R Dist.T.S. Edulakanti Kavya* et al. Sniffer Mr. T. PAVAN KUMAR Associate
More informationCYBER SECURITY MADE SIMPLE
CYBER SECURITY MADE SIMPLE Author: Christopher Gorog www.logiccentral.org www.newcyberfrontier.com Christopher Gorog, MBA, PMP, CISSP Lead Faculty for Cybersecurity at Colorado Technical University; Published
More informationSecurity. Communication security. System Security
Security Communication security security of data channel typical assumption: adversary has access to the physical link over which data is transmitted cryptographic separation is necessary System Security
More informationPROTECTING CONVERSATIONS
PROTECTING CONVERSATIONS Basics of Encrypted Network Communications Naïve Conversations Captured messages could be read by anyone Cannot be sure who sent the message you are reading Basic Definitions Authentication
More informationAdvanced Computer Networks Exercise Session 4. Qin Yin Spring Semester 2013
Advanced Computer Networks 263-3501-00 Exercise Session 4 Qin Yin Spring Semester 2013 1 Administration If you haven't received any email about your submission We got your solutions for A1 & A2 About solutions
More informationMobile Security / /
Mobile Security 96-835 / 18-639 / 14-829 Patrick Tague 2 Sept 2010 Class #4 Overview of Mobile/Cellular Systems Agenda Overview of mobile cellular systems System architecture and overview 2G, 2.5G, 2.75G,
More informationInternational Journal of Advance Research in Engineering, Science & Technology
Impact Factor (SJIF): 4.542 International Journal of Advance Research in Engineering, Science & Technology e-issn: 2393-9877, p-issn: 2394-2444 Volume 4, Issue 4, April-2017 Asymmetric Key Based Encryption
More informationCryptography & Key Exchange Protocols. Faculty of Computer Science & Engineering HCMC University of Technology
Cryptography & Key Exchange Protocols Faculty of Computer Science & Engineering HCMC University of Technology Outline 1 Cryptography-related concepts 2 3 4 5 6 7 Key channel for symmetric cryptosystems
More informationSecurity Management System of Cellular Communication: Case Study
Security Management System of Cellular Communication: Case Study Othman O. Khalifa, Abdulrazzag Aburas, A. Al Bagul, Meftah Hrairi, Muhammad Shahril bin Shahbuddin, and Harman bin Mat Kasa Abstract Cellular
More informationCryptographic Concepts
Outline Identify the different types of cryptography Learn about current cryptographic methods Chapter #23: Cryptography Understand how cryptography is applied for security Given a scenario, utilize general
More informationPublic-key Cryptography: Theory and Practice
Public-key Cryptography Theory and Practice Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Chapter 1: Overview What is Cryptography? Cryptography is the study of
More informationLorenz Cipher. Menu. Class 4: Modern Cryptography. British Cipher Machine. German Code-Breaking Efforts. Some loose ends on WWII Maurice Burnett
Cryptography in World War II Jefferson Institute for Lifelong Learning at UVa Spring 2006 David Evans Class 4: Modern Cryptography Menu Some loose ends on WWII Maurice Burnett Modern Cryptography Modern
More informationISA 662 Internet Security Protocols. Outline. Prime Numbers (I) Beauty of Mathematics. Division (II) Division (I)
Outline ISA 662 Internet Security Protocols Some Math Essentials & History Asymmetric signatures and key exchange Asymmetric encryption Symmetric MACs Lecture 2 ISA 662 1 2 Beauty of Mathematics Demonstration
More informatione-commerce Study Guide Test 2. Security Chapter 10
e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the
More informationData Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II
Data Communication Prof.A.Pal Dept of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 40 Secured Communication - II Hello and welcome to today's lecture on secured communication.
More informationEfficient GSM Authentication and Key Agreement Protocols with Robust User Privacy Protection
Efficient GSM Authentication and Key Agreement Protocols with Robust User Privacy Protection Author: Jing-Lin Wu, Wen-Shenq Juang and Sian-Teng Chen Department of Information Management, Shih Hsin University,
More informationChapter 9: Database Security: An Introduction. Nguyen Thi Ai Thao
Chapter 9: Database Security: An Introduction Nguyen Thi Ai Thao thaonguyen@cse.hcmut.edu.vn Spring- 2016 Outline Introduction to Database Security Issues Types of Security Threats to databases Database
More informationCloud Computing: Security Issues & Solution
International Journal of Computational Intelligence Research ISSN 0973-1873 Volume 13, Number 6 (2017), pp. 1419-1429 Research India Publications http://www.ripublication.com Cloud Computing: Security
More informationNETWORK SECURITY & CRYPTOGRAPHY
Assignment for IT Applications in Management Project On NETWORK SECURITY & CRYPTOGRAPHY Course Instructor Submitted By: Mr. ANIL KUMAR ROHIT BARVE 2013240 Section E PGDM 2013-15 Table of Contents Chapter
More informationEncryption I. An Introduction
Encryption I An Introduction Reading List ADO and SQL Server Security A Simple Guide to Cryptography Protecting Private Data with the Cryptography Namespaces Using MD5 to Encrypt Passwords in a Database
More informationGSM Mobility Management
GSM Mobility Management Phone Lin Ph.D. Email: plin@csie.ntu.edu.tw 1 Outlines Introduction GSM Location Update Basic Call Origination and Termination Procedures Mobility Databases Failure Restoration
More information