Posted Date : 07th Mar, 2025
Peer-Reviewed Journals List: A Guide to Quality Research Publications ...
Posted Date : 07th Mar, 2025
Choosing the right journal is crucial for successful publication. Cons...
Posted Date : 27th Feb, 2025
Why Peer-Reviewed Journals Matter Quality Control: The peer revie...
Posted Date : 27th Feb, 2025
The Peer Review Process The peer review process typically follows sev...
Posted Date : 27th Feb, 2025
What Are Peer-Reviewed Journals? A peer-reviewed journal is a publica...
Secure End to End Encryption Scheme over GSM Network System
Author Name : Arun Das G, Ajay M G, Bibitha Baby
ABSTRACT
Loads of public are extensively using GSM network system. The significance of mobile communication schemes is for a safe speech communication. In circumstance, in between the mobile station and the base station there remains not any encryption system offer the Air interface encryption. Moreover, here remain further wireless links are exposed to outbreak. To avert illegal use of the provision as well as to safeguard the secrecy of the mobile manipulators specifically circuit swapping based facilities it is significant to afford rational security systems. In this paper it briefly expresses the security actions of GSM technology. The paper is developed with an overall view of GSM protection and the algorithms that are mostly used. The mostly used algorithms are A3, A5 and A8. In this paper, it is conversing about the problems in the end to end encryption and the A3, A5 and A8 algorithm also the drawbacks of the algorithms. The A3 algorithm which is used for MS authentication. The A3 is a ciphering algorithm which is used to validate each mobile by validating the user password inside the SIM with the cryptographic key at the MSC. A5 is an algorithm used for wind voice privacy. A8 algorithm used is for voice privacy key generating. Also, the A8 is used for ciphering key.
Keywords: GSM security, Algorithm, Authentication, Encryption