International Journal of All Research Education & Scientific Methods

An ISO Certified Peer-Reviewed Journal

ISSN: 2455-6211

Latest News

Visitor Counter
4691440758

Secure End to End Encryption Scheme over GSM ...

You Are Here :
> > > >
Secure End to End Encryption Scheme over GSM ...

Secure End to End Encryption Scheme over GSM Network System

Author Name : Arun Das G, Ajay M G, Bibitha Baby

ABSTRACT

Loads of public are extensively using GSM network system. The significance of mobile communication schemes is for a safe speech communication. In circumstance, in between the mobile station and the base station there remains not any encryption system offer the Air interface encryption. Moreover, here remain further wireless links are exposed to outbreak. To avert illegal use of the provision as well as to safeguard the secrecy of the mobile manipulators specifically circuit swapping based facilities it is significant to afford rational security systems. In this paper it briefly expresses the security actions of GSM technology. The paper is developed with an overall view of GSM protection and the algorithms that are mostly used. The mostly used algorithms are A3, A5 and A8. In this paper, it is conversing about the problems in the end to end encryption and the A3, A5 and A8 algorithm also the drawbacks of the algorithms. The A3 algorithm which is used for MS authentication. The A3 is a ciphering algorithm which is used to validate each mobile by validating the user password inside the SIM with the cryptographic key at the MSC. A5 is an algorithm used for wind voice privacy. A8 algorithm used is for voice privacy key generating. Also, the A8 is used for ciphering key.

Keywords: GSM security, Algorithm, Authentication, Encryption