ACTION-TRIGGERED PUBLIC-KEY SYSTEM FOR GSM USING RSA WITH PHONE-DEPENDENT ENCRYPTION

Rehab K. El Nemr, Imane Aly Saroit Ismail, S. H. Ahmed

2006

Abstract

Security is a burning issue with intelligent security pausing as the most relevant as it is important in all types of applications which suffer from security related concerns. Accordingly, Security has become a need rather than a luxury. GSM Security flaws have been identified several years ago. Some of these flaws have been mended by the 3GPP but others are left to discussion. In this paper we will integrate a well known technique in the system; Public-key technique. Yet, we will introduce the solutions in a different point of view; they are Action-Triggered, meaning; it will work only if the flaw occurs. The original system will work in normal cases. We will also discuss End-to-End security and propose a mechanism of Key management to provide the subscribers with private calls’ option. Phone-Dependent technique is conducted to consider Service provider attacks.

References

  1. J. Quirke, May 2004. Security in the GSM system, http://www.ausmobile.com
  2. GSM 02.09 - Digital cellular telecommunications system (Phase 2+); Security aspects (GSM 02.09 version 8.0.1 Release 1999).
  3. R. Campbell and D. Mckunas, 2003. Analysis of Third Generation Mobile Security, Annual Motorola Project Review, Computer Science Dept., University of Illinois.
  4. Chengyuan Peng, 2003. GSM and GPRS Security, Telecommunications Software and Multimedia Laboratory, Helsinki University.
  5. ETSI TS 100 929.Digital Cellular Telecommunication System (Phase 2); Security related network functions. European Telecommunications Standards Institute., November 1999.
  6. O. Benoit1, N. Dabbous, 2004. Mobile Terminal Security, Report in the International Association for Cryptologic Research (IACR) Vol. 21, No. 3.
  7. Bruce Potter, May 2004. GSM Security, Network Security, vol. 2004, no.5, pp.4-5.
  8. Yong LI, Yin CHEN, Tie-Jun MA, Feb 2002. Security in GSM,www.gsmsecurity.net/papers/securityingsm.pdf.
  9. L. Ertaul and B. Kasim, June 2005. GSM Security, Proceedings of the 2005 International Conference on Wireless Networks, ICWN'05.
  10. A. Biryukov and A. Shamir, , April 2000. Real Time Cryptanalysis of A5/1 on a PC, Fast Software Encryption Workshop 2000, NY.
  11. J. Rao, P. Rohatgi, H. Scherzer and S. Tinguely, May 2002. Partitioning Attacks: Or how to rapidly clone some GSM cards, IEEE Symposium on Security and privacy, Okaland, p. 31.
  12. RSA Labs. RSA PKCS documents, http://www.rsasecurity.com/rsalabs/node.asp?id=2124 William Stallings, Cryptography and Network Security: Principles and Practice, Prentice Hall, ISBN: 0130914290.
  13. Limor Elbaz, October 2002. Using Public Key Cryptography in Mobile Phones, Discretix Technologies Ltd,VP. Research.
  14. 3GPP TS 55.205 V6.1.0 (2003-12): Specification of the GSM-MILENAGE algorithms: An example algorithm set for the GSM Authentication and Key Generation Functions A3 and A8.
Download


Paper Citation


in Harvard Style

K. El Nemr R., Aly Saroit Ismail I. and H. Ahmed S. (2006). ACTION-TRIGGERED PUBLIC-KEY SYSTEM FOR GSM USING RSA WITH PHONE-DEPENDENT ENCRYPTION . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006) ISBN 978-972-8865-63-4, pages 175-182. DOI: 10.5220/0002101701750182


in Bibtex Style

@conference{secrypt06,
author={Rehab K. El Nemr and Imane Aly Saroit Ismail and S. H. Ahmed},
title={ACTION-TRIGGERED PUBLIC-KEY SYSTEM FOR GSM USING RSA WITH PHONE-DEPENDENT ENCRYPTION},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)},
year={2006},
pages={175-182},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002101701750182},
isbn={978-972-8865-63-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2006)
TI - ACTION-TRIGGERED PUBLIC-KEY SYSTEM FOR GSM USING RSA WITH PHONE-DEPENDENT ENCRYPTION
SN - 978-972-8865-63-4
AU - K. El Nemr R.
AU - Aly Saroit Ismail I.
AU - H. Ahmed S.
PY - 2006
SP - 175
EP - 182
DO - 10.5220/0002101701750182