Please use this identifier to cite or link to this item: https://dspace.iiti.ac.in/handle/123456789/4650
Full metadata record
DC FieldValueLanguage
dc.contributor.authorChaudhari, Narendra S.en_US
dc.date.accessioned2022-03-17T01:00:00Z-
dc.date.accessioned2022-03-17T15:35:04Z-
dc.date.available2022-03-17T01:00:00Z-
dc.date.available2022-03-17T15:35:04Z-
dc.date.issued2017-
dc.identifier.citationSaxena, N., & Chaudhari, N. S. (2017). Secure algorithms for SAKA protocol in the GSM network. Paper presented at the Proceedings - WMNC 2017: 10th Wireless and Mobile Networking Conference, , 2018-January 1-8. doi:10.1109/WMNC.2017.8248853en_US
dc.identifier.isbn9781538617427-
dc.identifier.otherEID(2-s2.0-85049461213)-
dc.identifier.urihttps://doi.org/10.1109/WMNC.2017.8248853-
dc.identifier.urihttps://dspace.iiti.ac.in/handle/123456789/4650-
dc.description.abstractThis paper deals with the security vulnerabilities of the cryptographic algorithms A3, A8, and A5 existing in the GSM network. We review these algorithms and propose new secure algorithms named NewA3, NewA8, and NewA5 algorithms with respect to the A3, A8, and A5 algorithms. Our NewA5 algorithm is based on block ciphers, but we also propose NewA5 algorithm with Cipher Feedback, Counter, and Output Feedback modes to convert block cipher into stream cipher. However, stream cipher algorithms are slower than the block cipher algorithm. These new algorithms are proposed to use with a secure and efficient authentication and key agreement (AKA) protocol in the GSM network. The proposed architecture is secure against partition attack, narrow pipe attack, collision attack, interleaving attack, and man-in-the-middle attack. The security analysis of the proposed algorithms are discussed with respect to the cryptanalysis, brute force analysis, and operational analysis. We choose the NewA3 and NewA8 algorithms for challenge-response and key generation, respectively. Furthermore, the NewA5 is suitable for encryption as it is efficient than the existing A5/1 and A5/2 algorithms. In case when stream cipher algorithms are required to use, our new algorithms, NewA5-CTR, NewA5-CFB, and NewA5-OFB can be used for specific applications. These algorithms are completely secure and better than the existing A5/1 and A5/2 in terms of resistant to attacks. © 2017 IEEE.en_US
dc.language.isoenen_US
dc.publisherInstitute of Electrical and Electronics Engineers Inc.en_US
dc.sourceProceedings - WMNC 2017: 10th Wireless and Mobile Networking Conferenceen_US
dc.subjectCryptographyen_US
dc.subjectGlobal system for mobile communicationsen_US
dc.subjectInternet protocolsen_US
dc.subjectMobile securityen_US
dc.subjectMobile telecommunication systemsen_US
dc.subjectBlock cipher algorithmsen_US
dc.subjectCollision attacken_US
dc.subjectCOMPen_US
dc.subjectCryptographic algorithmsen_US
dc.subjectEfficient authenticationen_US
dc.subjectMan in the middle attacksen_US
dc.subjectNarrow Pipe Attacken_US
dc.subjectSecurity vulnerabilitiesen_US
dc.subjectNetwork securityen_US
dc.titleSecure algorithms for SAKA protocol in the GSM networken_US
dc.typeConference Paperen_US
dc.rights.licenseAll Open Access, Green-
Appears in Collections:Department of Computer Science and Engineering

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetric Badge: