SlideShare a Scribd company logo
1 of 18
Download to read offline
Security in GSM
www.rsmangrulkar.com
January 30, 2018
www.rsmangrulkar.com Security in GSM January 30, 2018 1 / 18
Security in GSM
Why Security
GSM security is provided for gsm network subscribers to
communicate securely without any intrusion.The security here is
covered for the air interface part and not for the fixed network part.
The authentication center (AuC) is a function to authenticate each
SIM card that attempts to connect to the GSM core network
(typically when the phone is powered on). Once the authentication is
successful, the HLR is allowed to manage the SIM and services
described above. An encryption key is also generated that is
subsequently used to encrypt all wireless communications (voice,
SMS, etc.) between the mobile phone and the GSM core network.
www.rsmangrulkar.com Security in GSM January 30, 2018 2 / 18
Figure 1: Types of Handover
www.rsmangrulkar.com Security in GSM January 30, 2018 3 / 18
Figure 2: Types of Handover
www.rsmangrulkar.com Security in GSM January 30, 2018 4 / 18
GSM Authentication
the MS will send either an IMSI or a TMSI to the BSS.
The BSS forwards the MSC/VLR
The MSC/VLR forwards the IMSI to the HLR and requests
verification of the IMSI as well as Authentication Triplets.
The HLR will forward the IMSI to the Authentication Center
(AUC) and request authentication triplets.
The AUC generates the triplets and sends them along with the
IMSI, back to the HLR.
www.rsmangrulkar.com Security in GSM January 30, 2018 5 / 18
GSM Authentication cont...
The HLR validates the IMSI by ensuring it is allowed on the
network and is allowed subscriber services. It then forwards the
IMSI and Triplets to the MSC/VLR.
The MSC/VLR stores the SRES and the Kc and forwards the
RAND to the BSS and orders the BSS to authenticate the MS.
The MS uses the RAND to calculate the SRES and sends the
SRES back to the BSS.
The BSS forwards the SRES up to the MSC/VLR.
The MSC/VLR compares the SRES generated by the AUC with
the SRES generated by the MS. If they match, then
authentication is completed successfully.
www.rsmangrulkar.com Security in GSM January 30, 2018 6 / 18
www.rsmangrulkar.com Security in GSM January 30, 2018 7 / 18
www.rsmangrulkar.com Security in GSM January 30, 2018 8 / 18
www.rsmangrulkar.com Security in GSM January 30, 2018 9 / 18
www.rsmangrulkar.com Security in GSM January 30, 2018 10 / 18
A3- Authentication
A3 Input: 128-bit RAND random, Ki 128-bit private key
32-bit SRES signed response
www.rsmangrulkar.com Security in GSM January 30, 2018 11 / 18
A8 Key Generator
A8 128-bit RAND random, Ki 128-bit private key
62-bit KC Cipher Key
www.rsmangrulkar.com Security in GSM January 30, 2018 12 / 18
COMP128
Comp 128 is MAC function (Message Authentication Codes)
We have 5 secret tables T0-512 Byte,T1-256 Byte,T2-128
Byte,T3-64 Byte and T4 -32 Byte
Then there are 8 loops of the following compression function :
Apply 5 rounds of table lookups and substitution using table T0
to T4.
Perform a permutation on the 128 output bits before next loop
,except in the last loop.
www.rsmangrulkar.com Security in GSM January 30, 2018 13 / 18
The COMP1281
algorithms are implementations of the A3 and A8
algorithms defined in the GSM standard. The A3algorithm is used
to authenticate the mobile station to the network. The A8
algorithm is used to generate the session key used by A5to encrypt
the data transmitted between the mobile station and the BTS.
In GSM, A5 was publicly available whereas A3 and A8 were secret.
1
SIM cards are manufactured based on three algorithms COMP128v1,
COMP128v2 and COMP128v3. It is important to note currently only
COMP128v1 version SIM cards can be cloned, since this is the only algorithm,
which has been cracked, bear in mind that 70% of all the SIM cards we use are
COMP128v1 https://www.tech2hack.com/how-to-clone-sim-card-easily/
www.rsmangrulkar.com Security in GSM January 30, 2018 14 / 18
www.rsmangrulkar.com Security in GSM January 30, 2018 15 / 18
www.rsmangrulkar.com Security in GSM January 30, 2018 16 / 18
www.rsmangrulkar.com Security in GSM January 30, 2018 17 / 18
www.rsmangrulkar.com Security in GSM January 30, 2018 18 / 18

More Related Content

What's hot (20)

Gsm signalling protocol
Gsm signalling protocolGsm signalling protocol
Gsm signalling protocol
 
Full gsm overview (modified)
Full gsm overview  (modified)Full gsm overview  (modified)
Full gsm overview (modified)
 
Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)Mobile computing (Wireless) Medium Access Control (MAC)
Mobile computing (Wireless) Medium Access Control (MAC)
 
Mobile network structure
Mobile network structure Mobile network structure
Mobile network structure
 
Gsm Originating Call Flow
Gsm Originating Call FlowGsm Originating Call Flow
Gsm Originating Call Flow
 
Gsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces Telebeans
 
IT8602 Mobile Communication Unit II
IT8602 Mobile Communication   Unit II IT8602 Mobile Communication   Unit II
IT8602 Mobile Communication Unit II
 
Cellular network
Cellular networkCellular network
Cellular network
 
Handover management
Handover managementHandover management
Handover management
 
Gsm call routing
Gsm call routingGsm call routing
Gsm call routing
 
Gsm architecture and call flow
Gsm architecture and call flowGsm architecture and call flow
Gsm architecture and call flow
 
Paging and Location Update
Paging and Location UpdatePaging and Location Update
Paging and Location Update
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 
WCDMA
WCDMAWCDMA
WCDMA
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
Moc mtc
Moc mtcMoc mtc
Moc mtc
 
GSM, Cell Planning & Frequency Reuse
GSM, Cell Planning & Frequency ReuseGSM, Cell Planning & Frequency Reuse
GSM, Cell Planning & Frequency Reuse
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
Evolution of mobile radio communication
Evolution of mobile radio communicationEvolution of mobile radio communication
Evolution of mobile radio communication
 
First and second generation communication
First and second generation communicationFirst and second generation communication
First and second generation communication
 

Similar to Security in GSM

GSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesGSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesEngr.MEESHU SHARKER
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular SystemsACMBangalore
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET Journal
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impactAhmad Sharifi
 
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALAGSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALASaikiran Panjala
 
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...ijsrd.com
 
Anti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAnti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAshu0711
 
Home Automation Using Mobile Communication
Home Automation Using Mobile CommunicationHome Automation Using Mobile Communication
Home Automation Using Mobile Communicationiosrjce
 
Smart Helmet using GSM and GPS
Smart Helmet using GSM and GPSSmart Helmet using GSM and GPS
Smart Helmet using GSM and GPSIRJET Journal
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...IJCSES Journal
 
Location based encryption in gsm cellular network
Location based encryption in gsm cellular networkLocation based encryption in gsm cellular network
Location based encryption in gsm cellular networkIAEME Publication
 

Similar to Security in GSM (20)

Security Issues Implement GSM.pptx
Security Issues Implement GSM.pptxSecurity Issues Implement GSM.pptx
Security Issues Implement GSM.pptx
 
GSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesGSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE Technologies
 
Presentation one-gsm
Presentation one-gsmPresentation one-gsm
Presentation one-gsm
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Total GSM Concept
Total GSM ConceptTotal GSM Concept
Total GSM Concept
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
IRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS SensorIRJET- ATM Security using GSM and MEMS Sensor
IRJET- ATM Security using GSM and MEMS Sensor
 
GSM Technology and security impact
GSM Technology and security impactGSM Technology and security impact
GSM Technology and security impact
 
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALAGSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
 
new Algorithm1
new Algorithm1new Algorithm1
new Algorithm1
 
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
Design and Implementation of Vehicle Gaseous Fuel Leakage Detection System us...
 
Security aspect in GSM
Security aspect in GSMSecurity aspect in GSM
Security aspect in GSM
 
Anti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 finalAnti theftsystemforvechicles1 final
Anti theftsystemforvechicles1 final
 
D017651519
D017651519D017651519
D017651519
 
Home Automation Using Mobile Communication
Home Automation Using Mobile CommunicationHome Automation Using Mobile Communication
Home Automation Using Mobile Communication
 
Smart Helmet using GSM and GPS
Smart Helmet using GSM and GPSSmart Helmet using GSM and GPS
Smart Helmet using GSM and GPS
 
GSM Introduction
GSM IntroductionGSM Introduction
GSM Introduction
 
Gsm security final
Gsm security finalGsm security final
Gsm security final
 
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...S ECURITY  I SSUES  A ND  C HALLENGES  I N  M OBILE  C OMPUTING  A ND  M - C ...
S ECURITY I SSUES A ND C HALLENGES I N M OBILE C OMPUTING A ND M - C ...
 
Location based encryption in gsm cellular network
Location based encryption in gsm cellular networkLocation based encryption in gsm cellular network
Location based encryption in gsm cellular network
 

More from Dr. Ramchandra Mangrulkar

Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Dr. Ramchandra Mangrulkar
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingDr. Ramchandra Mangrulkar
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Dr. Ramchandra Mangrulkar
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityDr. Ramchandra Mangrulkar
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Dr. Ramchandra Mangrulkar
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Dr. Ramchandra Mangrulkar
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part IDr. Ramchandra Mangrulkar
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity ManagementDr. Ramchandra Mangrulkar
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityDr. Ramchandra Mangrulkar
 

More from Dr. Ramchandra Mangrulkar (20)

Blockchain#2.pdf
Blockchain#2.pdfBlockchain#2.pdf
Blockchain#2.pdf
 
Blockchain#1.pdf
Blockchain#1.pdfBlockchain#1.pdf
Blockchain#1.pdf
 
Blockchain#3.pdf
Blockchain#3.pdfBlockchain#3.pdf
Blockchain#3.pdf
 
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
Manuscript Preparation using Latex: A Cloud Based Approach(Overleaf)
 
Lecture #32: Forensic Duplication
Lecture #32: Forensic DuplicationLecture #32: Forensic Duplication
Lecture #32: Forensic Duplication
 
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and ReportingLecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
Lecture #32: Digital Forensics : Evidence Handling, Validation and Reporting
 
LEcture #28-#30
LEcture #28-#30LEcture #28-#30
LEcture #28-#30
 
Lecture #31 : Windows Forensics
Lecture #31 : Windows ForensicsLecture #31 : Windows Forensics
Lecture #31 : Windows Forensics
 
Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0Lecture #25 : Oauth 2.0
Lecture #25 : Oauth 2.0
 
Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)Lecture #24 : Cross Site Request Forgery (CSRF)
Lecture #24 : Cross Site Request Forgery (CSRF)
 
Lecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security BreachLecture #22: Web Privacy & Security Breach
Lecture #22: Web Privacy & Security Breach
 
Lecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security BreachLecture #22 : Web Privacy & Security Breach
Lecture #22 : Web Privacy & Security Breach
 
Lecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLSLecture #21: HTTPS , SSL & TLS
Lecture #21: HTTPS , SSL & TLS
 
Lecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application SecurityLecture #18 - #20: Web Browser and Web Application Security
Lecture #18 - #20: Web Browser and Web Application Security
 
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
Lecture #15: Buffer Overflow Attack (Non Malicious Attack)
 
Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks Lecture # 14: Salami and Linearization Attacks
Lecture # 14: Salami and Linearization Attacks
 
Lecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part ILecture #12,#13 : Program and OS Security -Part I
Lecture #12,#13 : Program and OS Security -Part I
 
Lecture #9 : Single Sign on and Federation Identity Management
Lecture #9 :  Single Sign on and Federation Identity ManagementLecture #9 :  Single Sign on and Federation Identity Management
Lecture #9 : Single Sign on and Federation Identity Management
 
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel SecurityLecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
Lecture #8: Clark-Wilson & Chinese Wall Model for Multilevel Security
 
Lecture #6: Multilevel Security Models
Lecture #6: Multilevel Security ModelsLecture #6: Multilevel Security Models
Lecture #6: Multilevel Security Models
 

Recently uploaded

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 

Recently uploaded (20)

ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 

Security in GSM

  • 1. Security in GSM www.rsmangrulkar.com January 30, 2018 www.rsmangrulkar.com Security in GSM January 30, 2018 1 / 18
  • 2. Security in GSM Why Security GSM security is provided for gsm network subscribers to communicate securely without any intrusion.The security here is covered for the air interface part and not for the fixed network part. The authentication center (AuC) is a function to authenticate each SIM card that attempts to connect to the GSM core network (typically when the phone is powered on). Once the authentication is successful, the HLR is allowed to manage the SIM and services described above. An encryption key is also generated that is subsequently used to encrypt all wireless communications (voice, SMS, etc.) between the mobile phone and the GSM core network. www.rsmangrulkar.com Security in GSM January 30, 2018 2 / 18
  • 3. Figure 1: Types of Handover www.rsmangrulkar.com Security in GSM January 30, 2018 3 / 18
  • 4. Figure 2: Types of Handover www.rsmangrulkar.com Security in GSM January 30, 2018 4 / 18
  • 5. GSM Authentication the MS will send either an IMSI or a TMSI to the BSS. The BSS forwards the MSC/VLR The MSC/VLR forwards the IMSI to the HLR and requests verification of the IMSI as well as Authentication Triplets. The HLR will forward the IMSI to the Authentication Center (AUC) and request authentication triplets. The AUC generates the triplets and sends them along with the IMSI, back to the HLR. www.rsmangrulkar.com Security in GSM January 30, 2018 5 / 18
  • 6. GSM Authentication cont... The HLR validates the IMSI by ensuring it is allowed on the network and is allowed subscriber services. It then forwards the IMSI and Triplets to the MSC/VLR. The MSC/VLR stores the SRES and the Kc and forwards the RAND to the BSS and orders the BSS to authenticate the MS. The MS uses the RAND to calculate the SRES and sends the SRES back to the BSS. The BSS forwards the SRES up to the MSC/VLR. The MSC/VLR compares the SRES generated by the AUC with the SRES generated by the MS. If they match, then authentication is completed successfully. www.rsmangrulkar.com Security in GSM January 30, 2018 6 / 18
  • 7. www.rsmangrulkar.com Security in GSM January 30, 2018 7 / 18
  • 8. www.rsmangrulkar.com Security in GSM January 30, 2018 8 / 18
  • 9. www.rsmangrulkar.com Security in GSM January 30, 2018 9 / 18
  • 10. www.rsmangrulkar.com Security in GSM January 30, 2018 10 / 18
  • 11. A3- Authentication A3 Input: 128-bit RAND random, Ki 128-bit private key 32-bit SRES signed response www.rsmangrulkar.com Security in GSM January 30, 2018 11 / 18
  • 12. A8 Key Generator A8 128-bit RAND random, Ki 128-bit private key 62-bit KC Cipher Key www.rsmangrulkar.com Security in GSM January 30, 2018 12 / 18
  • 13. COMP128 Comp 128 is MAC function (Message Authentication Codes) We have 5 secret tables T0-512 Byte,T1-256 Byte,T2-128 Byte,T3-64 Byte and T4 -32 Byte Then there are 8 loops of the following compression function : Apply 5 rounds of table lookups and substitution using table T0 to T4. Perform a permutation on the 128 output bits before next loop ,except in the last loop. www.rsmangrulkar.com Security in GSM January 30, 2018 13 / 18
  • 14. The COMP1281 algorithms are implementations of the A3 and A8 algorithms defined in the GSM standard. The A3algorithm is used to authenticate the mobile station to the network. The A8 algorithm is used to generate the session key used by A5to encrypt the data transmitted between the mobile station and the BTS. In GSM, A5 was publicly available whereas A3 and A8 were secret. 1 SIM cards are manufactured based on three algorithms COMP128v1, COMP128v2 and COMP128v3. It is important to note currently only COMP128v1 version SIM cards can be cloned, since this is the only algorithm, which has been cracked, bear in mind that 70% of all the SIM cards we use are COMP128v1 https://www.tech2hack.com/how-to-clone-sim-card-easily/ www.rsmangrulkar.com Security in GSM January 30, 2018 14 / 18
  • 15. www.rsmangrulkar.com Security in GSM January 30, 2018 15 / 18
  • 16. www.rsmangrulkar.com Security in GSM January 30, 2018 16 / 18
  • 17. www.rsmangrulkar.com Security in GSM January 30, 2018 17 / 18
  • 18. www.rsmangrulkar.com Security in GSM January 30, 2018 18 / 18