SlideShare a Scribd company logo
GSM SECURITY AND
ENCRYPTION
presenting By
---------
12#####
Under the Guidance of
------------------------
ABSTRACTThe motivations for security in cellular telecommunications
systems are to secure conversations and signaling data from
interception as well as to prevent Cellular telephone fraud.
With the older analog—based cellular telephone systems
such as the Advanced Mobile Phone System (AMPS)and the
Total Access Communication System(TACS),it is a relatively
simple matter for the radio hobbyist to intercept cellular
telephone Conversions with police scanner.
INTRODUCTION
•GSM(Global system for mobile communication) is one of
the most popular mobile.Communication standards.GSM is
a second generation(2G) communication standard.
There are many multiplexing techniques and the various
standards that fall under.The GSM communication system.
GSM SERVICES:
 The list of services available to GSM
subscribers typically includes the following: voice
communication.
 voice mail, short message transmission, data
transmission .
 call forwarding.
GSM ARCHITECTURE
GSM Architecture contains three sub system
Radio sub system (RSS)
Network sub system(NSS)
Operation sub system(OSS)
COMPONENTS OF RSS:
-> MT’S(Mobile Devices)
-> BTS’S(Base Transceivers
Stations)
-> BSC’S(Base Station Controllers)
COMPONENTS OF NSS:
-> MSC’S(Mobile Services
Switching Centre)
-> HLR’S(Home Location Register)
-> VLR’S(Visitor Location Register)
COMPONENTS OF OSS:
-> OMC(Operation and Maintenance
Centre)
GSM SECURITY FEATURES
 Key management is independent of equipment
 Subscribers can change handsets without compromising security
 Subscriber identity protection
 not easy to identify the user of the system intercepting a user data
 Detection of compromised equipment
 Detection mechanism whether a mobile device was compromised or
not
 Subscriber authentication
 The operator knows for billing purposes who is using the system
Detection of Compromised
Equipment
 International Mobile Equipment Identifier (IMEI)
 Identifier allowing to identify mobiles
 IMEI is independent of SIM
 Used to identify stolen or compromised equipment
 Equipment Identity Register (EIR)
 Black list – stolen or non-type mobiles
 White list - valid mobiles
 Gray list – local tracking mobiles
 Central Equipment Identity Register (CEIR)
 Approved mobile type (type approval authorities)
 Consolidated black list (posted by operators)
Key Management Scheme
 Ki – Subscriber Authentication Key
 Shared 128 bit key used for authentication of subscriber by the
operator
 Key Storage
 Subscriber’s SIM (owned by operator, i.e. trusted)
 Operator’s Home Locator Register (HLR) of the subscriber’s home
network
 SIM can be used with different equipment
Subscriber Identity Protection
 TMSI – Temporary Mobile Subscriber Identity
 Goals
 TMSI is used instead of IMSI as an a temporary subscriber identifier
 TMSI prevents an eavesdropper from identifying of subscriber
 Usage
 TMSI is assigned when IMSI is transmitted to AuC on the first phone
switch on
 Every time a location update (new MSC) occur the networks assigns
a new TMSI
 TMSI is used by the MS to report to the network or during a call
initialization
 Network uses TMSI to communicate with MS
 On MS switch off TMSI is stored on SIM card to be reused next time
 The Visitor Location Register (VLR) performs assignment,
administration and update of the TMSI
GSM SECURITY METHODS
Below methods are used for security
 Authentication
 Encryption
Authentication and Encryption Scheme
13
A3
Mobile Station Radio Link GSM Operator
A8
A5
A3
A8
A5
Ki Ki
Challenge RAND
KcKc
mi Encrypted Data mi
SIM
Signed response (SRES)
SRESSRES
Fn Fn
Authentication: are SRES
values equal?
SECURITY THROUGH AUTHENTICATION
Authentication
 AuC – Authentication Center
 Provides parameters for authentication and encryption
functions (RAND, SRES, Kc)
 HLR – Home Location Register
 Provides MSC (Mobile Switching Center) with triples
(RAND, SRES, Kc)
 Handles MS location
 VLR – Visitor Location Register
 Stores generated triples by the HLR when a subscriber is
not in his home network
 One operator doesn’t have access to subscriber keys of
the another operator.
15
A3 – MS Authentication Algorithm
 Goal
 Generation of SRES response to MSC’s random
challenge RAND
16
A3
RAND (128 bit)
Ki (128 bit)
SRES (32 bit)
A8 – Voice Privacy Key Generation
Algorithm
 Goal
 Generation of session key Ks
 A8 specification was never made public
17
A8
RAND (128 bit)
Ki (128 bit)
KC (64 bit)
Logical Implementation
of A3 and A8
 COMP128 is used for both A3 and A8 in most GSM
networks.
 COMP128 is a keyed hash function
18
COMP128
RAND (128 bit)
Ki (128 bit)
128 bit output
SRES 32 bit and Kc 54 bit
SECURITY TROUGH ENCRYPTION
A5 – Encryption Algorithm
 A5 is a stream cipher
 Implemented very efficiently on hardware
 Design was never made public
 Leaked to Ross Anderson and Bruce Schneier
 Variants
 A5/1 – the strong version
 A5/2 – the weak version
 A5/3
 GSM Association Security Group and 3GPP design
 Based on Kasumi algorithm used in 3G mobile systems
20
A5 Encryption
21
Mobile Stations Base Station
Subsystem
Exchange
System
Network
Management
Subscriber and terminal
equipment databases
BSC MSC
VLR
HLR
EIR
AUC
OMC
BTS
BTS
BTS
A5 Encryption
Logical A5 Implementation
22
A5
Kc (64 bit)Fn (22 bit)
114 bit
XOR
Data (114 bit)
A5
Kc (64 bit)Fn (22 bit)
114 bit
XOR
Ciphertext (114 bit) Data (114 bit)
Mobile Station BTS
Real A5 output is 228 bit for both directions
EXPLANATION
 A5 is a stream cipher consisting of three clock-controlled
LFSRs of degree 19, 22, and 23.
 The clock control is a threshold function of the middle bits
of each of the three shift registers.
 The sum of the degrees of the three shift registers is 64.
The 64-bit session key is used to initialize the contents of
the shift registers.
 The 22-bit TDMA frame number is fed into the shift
registers.
 Two 114-bit key streams are produced for each TDMA
frame, which are XOR-e d with the uplink and downlink
traffic channels.
 It is rumored that the A5 algorithm has an "effective" key
length of 40 bits.
CONCLUSION
 The security mechanisms specified in the GSM
standard make it the most secure cellular
telecommunications system available. The use of
authentication, encryption, and temporary
identification numbers ensures the privacy and
anonymity of the system's users, as well as
safeguarding the system against fraudulent use.
REFERENCES
 Van der Arend, P. J. C., "Security Aspects and the
Implementation in the GSM System," Proceedings of the
Digital Cellular Radio Conference, Hagen, Westphalia,
Germany, October, 1988.
 Biala, J., "Mobilfunk und Intelligente Netze," Friedr.,
Vieweg & Sohn Verlagsgesellschaft, 1994.
 Cooke, J.C.; Brewster, R.L., "Cyptographic Security
Techniques for Digital Mobile Telephones," Proceedings of
the IEEE International Conference on Selected Topics in
Wireless Communications, Vancouver, B.C., Canada, 1992.
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA

More Related Content

What's hot

Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
Naveen Kumar
 
GSM
GSMGSM
Gsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces Telebeans
Telebeansolutions
 
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkMy PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkARVIND SARDAR
 
Evolution of mobile radio communication
Evolution of mobile radio communicationEvolution of mobile radio communication
Evolution of mobile radio communication
jadhavmanoj01
 
Gsm architecture and call flow
Gsm architecture and call flowGsm architecture and call flow
Gsm architecture and call flow
Mohd Nazir Shakeel
 
GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.
Student
 
HANDOFF
HANDOFFHANDOFF
HANDOFF
AJAL A J
 
The GSM Technology
The GSM TechnologyThe GSM Technology
The GSM Technology
WajahatHussain68
 
4 g LTE, LTE Advance
4 g LTE, LTE Advance 4 g LTE, LTE Advance
4 g LTE, LTE Advance
Sajid Marwat
 
Global system for mobile communication(GSM)
Global system for mobile communication(GSM)Global system for mobile communication(GSM)
Global system for mobile communication(GSM)
Jay Nagar
 
Main project report on GSM BASED WIRELESS NOTICE BOARD
Main project report on GSM BASED WIRELESS NOTICE BOARD Main project report on GSM BASED WIRELESS NOTICE BOARD
Main project report on GSM BASED WIRELESS NOTICE BOARD
Ganesh Gani
 
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
Vikas Shokeen
 
SEMINAR REPORT ON GSM ARCHITECTURE
SEMINAR REPORT ON GSM ARCHITECTURESEMINAR REPORT ON GSM ARCHITECTURE
SEMINAR REPORT ON GSM ARCHITECTURE
salman khan
 
Noma-5G technology
Noma-5G  technologyNoma-5G  technology
Noma-5G technology
gouthami3616
 
GSM, Cell Planning & Frequency Reuse
GSM, Cell Planning & Frequency ReuseGSM, Cell Planning & Frequency Reuse
GSM, Cell Planning & Frequency Reuse
sanjida2222
 
Digital Cellular Technologies
Digital Cellular TechnologiesDigital Cellular Technologies
Digital Cellular Technologies
T. L. Singal
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communicationMuhammad Uzair Rasheed
 

What's hot (20)

GSM Presentation
GSM PresentationGSM Presentation
GSM Presentation
 
Security in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) NetworksSecurity in GSM(2G) and UMTS(3G) Networks
Security in GSM(2G) and UMTS(3G) Networks
 
GSM
GSMGSM
GSM
 
Gsm architecture and interfaces Telebeans
Gsm architecture and interfaces TelebeansGsm architecture and interfaces Telebeans
Gsm architecture and interfaces Telebeans
 
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE NetworkMy PptIntroduction to 3G, GSM, GPRS, EDGE Network
My PptIntroduction to 3G, GSM, GPRS, EDGE Network
 
Evolution of mobile radio communication
Evolution of mobile radio communicationEvolution of mobile radio communication
Evolution of mobile radio communication
 
Gsm architecture and call flow
Gsm architecture and call flowGsm architecture and call flow
Gsm architecture and call flow
 
GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.GSM. Global System for Mobile Communication.
GSM. Global System for Mobile Communication.
 
GPRS
GPRSGPRS
GPRS
 
HANDOFF
HANDOFFHANDOFF
HANDOFF
 
The GSM Technology
The GSM TechnologyThe GSM Technology
The GSM Technology
 
4 g LTE, LTE Advance
4 g LTE, LTE Advance 4 g LTE, LTE Advance
4 g LTE, LTE Advance
 
Global system for mobile communication(GSM)
Global system for mobile communication(GSM)Global system for mobile communication(GSM)
Global system for mobile communication(GSM)
 
Main project report on GSM BASED WIRELESS NOTICE BOARD
Main project report on GSM BASED WIRELESS NOTICE BOARD Main project report on GSM BASED WIRELESS NOTICE BOARD
Main project report on GSM BASED WIRELESS NOTICE BOARD
 
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
VoLTE Voice over LTE Explained - Complete End to End VoLTE Overview - What is...
 
SEMINAR REPORT ON GSM ARCHITECTURE
SEMINAR REPORT ON GSM ARCHITECTURESEMINAR REPORT ON GSM ARCHITECTURE
SEMINAR REPORT ON GSM ARCHITECTURE
 
Noma-5G technology
Noma-5G  technologyNoma-5G  technology
Noma-5G technology
 
GSM, Cell Planning & Frequency Reuse
GSM, Cell Planning & Frequency ReuseGSM, Cell Planning & Frequency Reuse
GSM, Cell Planning & Frequency Reuse
 
Digital Cellular Technologies
Digital Cellular TechnologiesDigital Cellular Technologies
Digital Cellular Technologies
 
Gsm – global system for mobile communication
Gsm – global system for mobile communicationGsm – global system for mobile communication
Gsm – global system for mobile communication
 

Similar to GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA

Gsm security final
Gsm security finalGsm security final
Gsm security final
Sanket Yavalkar
 
GSM Architecture.ppt
 GSM Architecture.ppt GSM Architecture.ppt
GSM Architecture.ppt
Danish Mahmood
 
Mob. comp . prst
Mob. comp . prstMob. comp . prst
Mob. comp . prst
Bhanu Pratap
 
Presentation one-gsm
Presentation one-gsmPresentation one-gsm
Presentation one-gsm
Abu Sadat Mohammed Yasin
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecturesumit singh
 
GSM network
GSM networkGSM network
GSM network
WebAshlar
 
Rk 3 gsm network
Rk 3 gsm networkRk 3 gsm network
Rk 3 gsm network
Azri Randy
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
Luca Bongiorni
 
GSM
GSMGSM
Final gsm1
Final gsm1Final gsm1
Final gsm1
Arun Kumar
 
GSM Introduction
GSM IntroductionGSM Introduction
GSM Introduction
Tempus Telcosys
 
GSM.ppt
GSM.pptGSM.ppt
Total GSM Concept
Total GSM ConceptTotal GSM Concept
Total GSM Concept
Tempus Telcosys
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
IJERD Editor
 
Operation and mainetainence of switch ppt
Operation and mainetainence of switch pptOperation and mainetainence of switch ppt
Operation and mainetainence of switch ppt
Isha Negi
 
Switching systems lecture7
Switching  systems lecture7Switching  systems lecture7
Switching systems lecture7
Jumaan Ally Mohamed
 
gsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfgsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdf
samss12
 

Similar to GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA (20)

Gsm security final
Gsm security finalGsm security final
Gsm security final
 
GSM Architecture.ppt
 GSM Architecture.ppt GSM Architecture.ppt
GSM Architecture.ppt
 
Mob. comp . prst
Mob. comp . prstMob. comp . prst
Mob. comp . prst
 
Presentation one-gsm
Presentation one-gsmPresentation one-gsm
Presentation one-gsm
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
GSM network
GSM networkGSM network
GSM network
 
Rk 3 gsm network
Rk 3 gsm networkRk 3 gsm network
Rk 3 gsm network
 
Rk 3 gsm network @guddu
Rk 3 gsm network @gudduRk 3 gsm network @guddu
Rk 3 gsm network @guddu
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
 
Gsm Network
Gsm NetworkGsm Network
Gsm Network
 
report
reportreport
report
 
GSM
GSMGSM
GSM
 
Final gsm1
Final gsm1Final gsm1
Final gsm1
 
GSM Introduction
GSM IntroductionGSM Introduction
GSM Introduction
 
GSM.ppt
GSM.pptGSM.ppt
GSM.ppt
 
Total GSM Concept
Total GSM ConceptTotal GSM Concept
Total GSM Concept
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Operation and mainetainence of switch ppt
Operation and mainetainence of switch pptOperation and mainetainence of switch ppt
Operation and mainetainence of switch ppt
 
Switching systems lecture7
Switching  systems lecture7Switching  systems lecture7
Switching systems lecture7
 
gsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdfgsmarchitecture-130331091401-phpapp01.pdf
gsmarchitecture-130331091401-phpapp01.pdf
 

More from Saikiran Panjala

DEVELOPMENT OF INTERNET BY SAIKIRAN PANJALA
DEVELOPMENT OF INTERNET BY SAIKIRAN PANJALADEVELOPMENT OF INTERNET BY SAIKIRAN PANJALA
DEVELOPMENT OF INTERNET BY SAIKIRAN PANJALA
Saikiran Panjala
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
Saikiran Panjala
 
HUMAN COMPUTER INTERACTION TECHNIQUES BY SAIKIRAN PANJALA
HUMAN COMPUTER INTERACTION TECHNIQUES BY SAIKIRAN PANJALAHUMAN COMPUTER INTERACTION TECHNIQUES BY SAIKIRAN PANJALA
HUMAN COMPUTER INTERACTION TECHNIQUES BY SAIKIRAN PANJALA
Saikiran Panjala
 
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALAA Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
Saikiran Panjala
 
Voice over IP By SAIKIRAN PANJALA
Voice over IP By SAIKIRAN PANJALAVoice over IP By SAIKIRAN PANJALA
Voice over IP By SAIKIRAN PANJALA
Saikiran Panjala
 
LATEST TRENDS IN ANDROID TECHNOLOGY BY SAIKIRAN PANJALA
LATEST TRENDS IN ANDROID TECHNOLOGY BY SAIKIRAN PANJALALATEST TRENDS IN ANDROID TECHNOLOGY BY SAIKIRAN PANJALA
LATEST TRENDS IN ANDROID TECHNOLOGY BY SAIKIRAN PANJALA
Saikiran Panjala
 
DATA WAREHOUSE IMPLEMENTATION BY SAIKIRAN PANJALA
DATA WAREHOUSE IMPLEMENTATION BY SAIKIRAN PANJALADATA WAREHOUSE IMPLEMENTATION BY SAIKIRAN PANJALA
DATA WAREHOUSE IMPLEMENTATION BY SAIKIRAN PANJALA
Saikiran Panjala
 
Mobile Voice over Internet Protocol By SAIKIRAN PANJALA
Mobile Voice over Internet Protocol By SAIKIRAN PANJALAMobile Voice over Internet Protocol By SAIKIRAN PANJALA
Mobile Voice over Internet Protocol By SAIKIRAN PANJALA
Saikiran Panjala
 
FEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALA
FEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALAFEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALA
FEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALA
Saikiran Panjala
 
CLOUD COMPUTING AND SERVICES BY SAIKIRAN PANJALA
CLOUD COMPUTING AND SERVICES BY SAIKIRAN PANJALACLOUD COMPUTING AND SERVICES BY SAIKIRAN PANJALA
CLOUD COMPUTING AND SERVICES BY SAIKIRAN PANJALA
Saikiran Panjala
 
Digital Audio Broadcasting By SAIKIRAN PANJALA
Digital  Audio Broadcasting By SAIKIRAN PANJALADigital  Audio Broadcasting By SAIKIRAN PANJALA
Digital Audio Broadcasting By SAIKIRAN PANJALA
Saikiran Panjala
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Saikiran Panjala
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
Saikiran Panjala
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
Saikiran Panjala
 
EXTENSIBLE MARKUP LANGUAGE BY SAIKIRAN PANJALA
EXTENSIBLE MARKUP LANGUAGE BY SAIKIRAN PANJALAEXTENSIBLE MARKUP LANGUAGE BY SAIKIRAN PANJALA
EXTENSIBLE MARKUP LANGUAGE BY SAIKIRAN PANJALA
Saikiran Panjala
 
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALAWIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
Saikiran Panjala
 
DATA BASE MANAGEMENT SYSTEM BY SAIKIRAN PANJALA
DATA BASE  MANAGEMENT SYSTEM BY SAIKIRAN PANJALADATA BASE  MANAGEMENT SYSTEM BY SAIKIRAN PANJALA
DATA BASE MANAGEMENT SYSTEM BY SAIKIRAN PANJALA
Saikiran Panjala
 
ACTIVE SERVER PAGES BY SAIKIRAN PANJALA
ACTIVE SERVER PAGES BY SAIKIRAN PANJALAACTIVE SERVER PAGES BY SAIKIRAN PANJALA
ACTIVE SERVER PAGES BY SAIKIRAN PANJALA
Saikiran Panjala
 
INTRANET MAILING SYSTEM BY SAIKIRAN PANJALA
INTRANET MAILING SYSTEM BY SAIKIRAN PANJALAINTRANET MAILING SYSTEM BY SAIKIRAN PANJALA
INTRANET MAILING SYSTEM BY SAIKIRAN PANJALA
Saikiran Panjala
 
DVD TECHNOLOGY SANTHOSH GUNDA BY SAIKIRAN PANJALA
DVD TECHNOLOGY SANTHOSH GUNDA BY SAIKIRAN PANJALADVD TECHNOLOGY SANTHOSH GUNDA BY SAIKIRAN PANJALA
DVD TECHNOLOGY SANTHOSH GUNDA BY SAIKIRAN PANJALA
Saikiran Panjala
 

More from Saikiran Panjala (20)

DEVELOPMENT OF INTERNET BY SAIKIRAN PANJALA
DEVELOPMENT OF INTERNET BY SAIKIRAN PANJALADEVELOPMENT OF INTERNET BY SAIKIRAN PANJALA
DEVELOPMENT OF INTERNET BY SAIKIRAN PANJALA
 
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALAVIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
VIRTUAL PRIVATE NETWORKS BY SAIKIRAN PANJALA
 
HUMAN COMPUTER INTERACTION TECHNIQUES BY SAIKIRAN PANJALA
HUMAN COMPUTER INTERACTION TECHNIQUES BY SAIKIRAN PANJALAHUMAN COMPUTER INTERACTION TECHNIQUES BY SAIKIRAN PANJALA
HUMAN COMPUTER INTERACTION TECHNIQUES BY SAIKIRAN PANJALA
 
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALAA Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
 
Voice over IP By SAIKIRAN PANJALA
Voice over IP By SAIKIRAN PANJALAVoice over IP By SAIKIRAN PANJALA
Voice over IP By SAIKIRAN PANJALA
 
LATEST TRENDS IN ANDROID TECHNOLOGY BY SAIKIRAN PANJALA
LATEST TRENDS IN ANDROID TECHNOLOGY BY SAIKIRAN PANJALALATEST TRENDS IN ANDROID TECHNOLOGY BY SAIKIRAN PANJALA
LATEST TRENDS IN ANDROID TECHNOLOGY BY SAIKIRAN PANJALA
 
DATA WAREHOUSE IMPLEMENTATION BY SAIKIRAN PANJALA
DATA WAREHOUSE IMPLEMENTATION BY SAIKIRAN PANJALADATA WAREHOUSE IMPLEMENTATION BY SAIKIRAN PANJALA
DATA WAREHOUSE IMPLEMENTATION BY SAIKIRAN PANJALA
 
Mobile Voice over Internet Protocol By SAIKIRAN PANJALA
Mobile Voice over Internet Protocol By SAIKIRAN PANJALAMobile Voice over Internet Protocol By SAIKIRAN PANJALA
Mobile Voice over Internet Protocol By SAIKIRAN PANJALA
 
FEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALA
FEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALAFEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALA
FEATURES OF CLOUD COMPUTING BY SAIKIRAN PANJALA
 
CLOUD COMPUTING AND SERVICES BY SAIKIRAN PANJALA
CLOUD COMPUTING AND SERVICES BY SAIKIRAN PANJALACLOUD COMPUTING AND SERVICES BY SAIKIRAN PANJALA
CLOUD COMPUTING AND SERVICES BY SAIKIRAN PANJALA
 
Digital Audio Broadcasting By SAIKIRAN PANJALA
Digital  Audio Broadcasting By SAIKIRAN PANJALADigital  Audio Broadcasting By SAIKIRAN PANJALA
Digital Audio Broadcasting By SAIKIRAN PANJALA
 
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALABluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
Bluetooth Based Smart Sensor Network By SAIKIRAN PANJALA
 
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
AN  ATM WITH  AN  EYE BY SAIKIRAN PANJALAAN  ATM WITH  AN  EYE BY SAIKIRAN PANJALA
AN ATM WITH AN EYE BY SAIKIRAN PANJALA
 
FIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALAFIREWALLS BY SAIKIRAN PANJALA
FIREWALLS BY SAIKIRAN PANJALA
 
EXTENSIBLE MARKUP LANGUAGE BY SAIKIRAN PANJALA
EXTENSIBLE MARKUP LANGUAGE BY SAIKIRAN PANJALAEXTENSIBLE MARKUP LANGUAGE BY SAIKIRAN PANJALA
EXTENSIBLE MARKUP LANGUAGE BY SAIKIRAN PANJALA
 
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALAWIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
WIRELESS NETWORKED DIGITAL DEVICES BY SAIKIRAN PANJALA
 
DATA BASE MANAGEMENT SYSTEM BY SAIKIRAN PANJALA
DATA BASE  MANAGEMENT SYSTEM BY SAIKIRAN PANJALADATA BASE  MANAGEMENT SYSTEM BY SAIKIRAN PANJALA
DATA BASE MANAGEMENT SYSTEM BY SAIKIRAN PANJALA
 
ACTIVE SERVER PAGES BY SAIKIRAN PANJALA
ACTIVE SERVER PAGES BY SAIKIRAN PANJALAACTIVE SERVER PAGES BY SAIKIRAN PANJALA
ACTIVE SERVER PAGES BY SAIKIRAN PANJALA
 
INTRANET MAILING SYSTEM BY SAIKIRAN PANJALA
INTRANET MAILING SYSTEM BY SAIKIRAN PANJALAINTRANET MAILING SYSTEM BY SAIKIRAN PANJALA
INTRANET MAILING SYSTEM BY SAIKIRAN PANJALA
 
DVD TECHNOLOGY SANTHOSH GUNDA BY SAIKIRAN PANJALA
DVD TECHNOLOGY SANTHOSH GUNDA BY SAIKIRAN PANJALADVD TECHNOLOGY SANTHOSH GUNDA BY SAIKIRAN PANJALA
DVD TECHNOLOGY SANTHOSH GUNDA BY SAIKIRAN PANJALA
 

Recently uploaded

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
AafreenAbuthahir2
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
Kamal Acharya
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
Kamal Acharya
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
VENKATESHvenky89705
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
Kamal Acharya
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
ankuprajapati0525
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Teleport Manpower Consultant
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
TeeVichai
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
fxintegritypublishin
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
Kamal Acharya
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
Kamal Acharya
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation & Control
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
Pratik Pawar
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
seandesed
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
gdsczhcet
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
Osamah Alsalih
 

Recently uploaded (20)

一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234WATER CRISIS and its solutions-pptx 1234
WATER CRISIS and its solutions-pptx 1234
 
Final project report on grocery store management system..pdf
Final project report on grocery store management system..pdfFinal project report on grocery store management system..pdf
Final project report on grocery store management system..pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
road safety engineering r s e unit 3.pdf
road safety engineering  r s e unit 3.pdfroad safety engineering  r s e unit 3.pdf
road safety engineering r s e unit 3.pdf
 
Cosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdfCosmetic shop management system project report.pdf
Cosmetic shop management system project report.pdf
 
The role of big data in decision making.
The role of big data in decision making.The role of big data in decision making.
The role of big data in decision making.
 
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdfTop 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
Top 10 Oil and Gas Projects in Saudi Arabia 2024.pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
Railway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdfRailway Signalling Principles Edition 3.pdf
Railway Signalling Principles Edition 3.pdf
 
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdfHybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdf
 
Automobile Management System Project Report.pdf
Automobile Management System Project Report.pdfAutomobile Management System Project Report.pdf
Automobile Management System Project Report.pdf
 
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdfCOLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
COLLEGE BUS MANAGEMENT SYSTEM PROJECT REPORT.pdf
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
Water Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdfWater Industry Process Automation and Control Monthly - May 2024.pdf
Water Industry Process Automation and Control Monthly - May 2024.pdf
 
weather web application report.pdf
weather web application report.pdfweather web application report.pdf
weather web application report.pdf
 
Architectural Portfolio Sean Lockwood
Architectural Portfolio Sean LockwoodArchitectural Portfolio Sean Lockwood
Architectural Portfolio Sean Lockwood
 
Gen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdfGen AI Study Jams _ For the GDSC Leads in India.pdf
Gen AI Study Jams _ For the GDSC Leads in India.pdf
 
MCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdfMCQ Soil mechanics questions (Soil shear strength).pdf
MCQ Soil mechanics questions (Soil shear strength).pdf
 

GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA

  • 1. GSM SECURITY AND ENCRYPTION presenting By --------- 12##### Under the Guidance of ------------------------
  • 2. ABSTRACTThe motivations for security in cellular telecommunications systems are to secure conversations and signaling data from interception as well as to prevent Cellular telephone fraud. With the older analog—based cellular telephone systems such as the Advanced Mobile Phone System (AMPS)and the Total Access Communication System(TACS),it is a relatively simple matter for the radio hobbyist to intercept cellular telephone Conversions with police scanner.
  • 3. INTRODUCTION •GSM(Global system for mobile communication) is one of the most popular mobile.Communication standards.GSM is a second generation(2G) communication standard. There are many multiplexing techniques and the various standards that fall under.The GSM communication system.
  • 4. GSM SERVICES:  The list of services available to GSM subscribers typically includes the following: voice communication.  voice mail, short message transmission, data transmission .  call forwarding.
  • 6. GSM Architecture contains three sub system Radio sub system (RSS) Network sub system(NSS) Operation sub system(OSS)
  • 7. COMPONENTS OF RSS: -> MT’S(Mobile Devices) -> BTS’S(Base Transceivers Stations) -> BSC’S(Base Station Controllers) COMPONENTS OF NSS: -> MSC’S(Mobile Services Switching Centre) -> HLR’S(Home Location Register) -> VLR’S(Visitor Location Register) COMPONENTS OF OSS: -> OMC(Operation and Maintenance Centre)
  • 8. GSM SECURITY FEATURES  Key management is independent of equipment  Subscribers can change handsets without compromising security  Subscriber identity protection  not easy to identify the user of the system intercepting a user data  Detection of compromised equipment  Detection mechanism whether a mobile device was compromised or not  Subscriber authentication  The operator knows for billing purposes who is using the system
  • 9. Detection of Compromised Equipment  International Mobile Equipment Identifier (IMEI)  Identifier allowing to identify mobiles  IMEI is independent of SIM  Used to identify stolen or compromised equipment  Equipment Identity Register (EIR)  Black list – stolen or non-type mobiles  White list - valid mobiles  Gray list – local tracking mobiles  Central Equipment Identity Register (CEIR)  Approved mobile type (type approval authorities)  Consolidated black list (posted by operators)
  • 10. Key Management Scheme  Ki – Subscriber Authentication Key  Shared 128 bit key used for authentication of subscriber by the operator  Key Storage  Subscriber’s SIM (owned by operator, i.e. trusted)  Operator’s Home Locator Register (HLR) of the subscriber’s home network  SIM can be used with different equipment
  • 11. Subscriber Identity Protection  TMSI – Temporary Mobile Subscriber Identity  Goals  TMSI is used instead of IMSI as an a temporary subscriber identifier  TMSI prevents an eavesdropper from identifying of subscriber  Usage  TMSI is assigned when IMSI is transmitted to AuC on the first phone switch on  Every time a location update (new MSC) occur the networks assigns a new TMSI  TMSI is used by the MS to report to the network or during a call initialization  Network uses TMSI to communicate with MS  On MS switch off TMSI is stored on SIM card to be reused next time  The Visitor Location Register (VLR) performs assignment, administration and update of the TMSI
  • 12. GSM SECURITY METHODS Below methods are used for security  Authentication  Encryption
  • 13. Authentication and Encryption Scheme 13 A3 Mobile Station Radio Link GSM Operator A8 A5 A3 A8 A5 Ki Ki Challenge RAND KcKc mi Encrypted Data mi SIM Signed response (SRES) SRESSRES Fn Fn Authentication: are SRES values equal?
  • 15. Authentication  AuC – Authentication Center  Provides parameters for authentication and encryption functions (RAND, SRES, Kc)  HLR – Home Location Register  Provides MSC (Mobile Switching Center) with triples (RAND, SRES, Kc)  Handles MS location  VLR – Visitor Location Register  Stores generated triples by the HLR when a subscriber is not in his home network  One operator doesn’t have access to subscriber keys of the another operator. 15
  • 16. A3 – MS Authentication Algorithm  Goal  Generation of SRES response to MSC’s random challenge RAND 16 A3 RAND (128 bit) Ki (128 bit) SRES (32 bit)
  • 17. A8 – Voice Privacy Key Generation Algorithm  Goal  Generation of session key Ks  A8 specification was never made public 17 A8 RAND (128 bit) Ki (128 bit) KC (64 bit)
  • 18. Logical Implementation of A3 and A8  COMP128 is used for both A3 and A8 in most GSM networks.  COMP128 is a keyed hash function 18 COMP128 RAND (128 bit) Ki (128 bit) 128 bit output SRES 32 bit and Kc 54 bit
  • 20. A5 – Encryption Algorithm  A5 is a stream cipher  Implemented very efficiently on hardware  Design was never made public  Leaked to Ross Anderson and Bruce Schneier  Variants  A5/1 – the strong version  A5/2 – the weak version  A5/3  GSM Association Security Group and 3GPP design  Based on Kasumi algorithm used in 3G mobile systems 20
  • 21. A5 Encryption 21 Mobile Stations Base Station Subsystem Exchange System Network Management Subscriber and terminal equipment databases BSC MSC VLR HLR EIR AUC OMC BTS BTS BTS A5 Encryption
  • 22. Logical A5 Implementation 22 A5 Kc (64 bit)Fn (22 bit) 114 bit XOR Data (114 bit) A5 Kc (64 bit)Fn (22 bit) 114 bit XOR Ciphertext (114 bit) Data (114 bit) Mobile Station BTS Real A5 output is 228 bit for both directions
  • 23. EXPLANATION  A5 is a stream cipher consisting of three clock-controlled LFSRs of degree 19, 22, and 23.  The clock control is a threshold function of the middle bits of each of the three shift registers.  The sum of the degrees of the three shift registers is 64. The 64-bit session key is used to initialize the contents of the shift registers.  The 22-bit TDMA frame number is fed into the shift registers.  Two 114-bit key streams are produced for each TDMA frame, which are XOR-e d with the uplink and downlink traffic channels.  It is rumored that the A5 algorithm has an "effective" key length of 40 bits.
  • 24. CONCLUSION  The security mechanisms specified in the GSM standard make it the most secure cellular telecommunications system available. The use of authentication, encryption, and temporary identification numbers ensures the privacy and anonymity of the system's users, as well as safeguarding the system against fraudulent use.
  • 25. REFERENCES  Van der Arend, P. J. C., "Security Aspects and the Implementation in the GSM System," Proceedings of the Digital Cellular Radio Conference, Hagen, Westphalia, Germany, October, 1988.  Biala, J., "Mobilfunk und Intelligente Netze," Friedr., Vieweg & Sohn Verlagsgesellschaft, 1994.  Cooke, J.C.; Brewster, R.L., "Cyptographic Security Techniques for Digital Mobile Telephones," Proceedings of the IEEE International Conference on Selected Topics in Wireless Communications, Vancouver, B.C., Canada, 1992.