Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4650
Title: Secure algorithms for SAKA protocol in the GSM network
Authors: Chaudhari, Narendra S.
Keywords: Cryptography;Global system for mobile communications;Internet protocols;Mobile security;Mobile telecommunication systems;Block cipher algorithms;Collision attack;COMP;Cryptographic algorithms;Efficient authentication;Man in the middle attacks;Narrow Pipe Attack;Security vulnerabilities;Network security
Issue Date: 2017
Publisher: Institute of Electrical and Electronics Engineers Inc.
Citation: Saxena, N., & Chaudhari, N. S. (2017). Secure algorithms for SAKA protocol in the GSM network. Paper presented at the Proceedings - WMNC 2017: 10th Wireless and Mobile Networking Conference, , 2018-January 1-8. doi:10.1109/WMNC.2017.8248853
Abstract: This paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3, A8, and A5 algorithms. Our NewA5 algorithm is based on block ciphers, but we also propose NewA5 algorithm with Cipher Feedback, Counter, and Output Feedback modes to convert block cipher into stream cipher. However, stream cipher algorithms are slower than the block cipher algorithm. These new algorithms are proposed to use with a secure and efficient authentication and key agreement (AKA) protocol in the GSM network. The proposed architecture is secure against partition attack, narrow pipe attack, collision attack, interleaving attack, and man-in-the-middle attack. The security analysis of the proposed algorithms are discussed with respect to the cryptanalysis, brute force analysis, and operational analysis. We choose the NewA3 and NewA8 algorithms for challenge-response and key generation, respectively. Furthermore, the NewA5 is suitable for encryption as it is efficient than the existing A5/1 and A5/2 algorithms. In case when stream cipher algorithms are required to use, our new algorithms, NewA5-CTR, NewA5-CFB, and NewA5-OFB can be used for specific applications. These algorithms are completely secure and better than the existing A5/1 and A5/2 in terms of resistant to attacks. © 2017 IEEE.
URI: https://doi.org/10.1109/WMNC.2017.8248853
https://dspace.iiti.ac.in/handle/123456789/4650
ISBN: 9781538617427
Type of Material: Conference Paper
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: