A Contemporary Foreword on GSM Security
This article contains a current outline of the GSM system security, with focus on the air interface protocol. It presents the terminology and describes the GSM security operation, including its principles and features. This document also discusses the effectiveness of GSM authentication and the strength of GSM encryption. It includes therefore the most significant physical and cryptanalytic attacks on GSM security mechanisms, such as the up to date optical fault induction and partitioning attacks. GSM security features retained and enhanced for the 3G Security and further applications in network (Internet) remote access are also contemplated. This article aims primarily at contributing to a progressive research in mobile systems security and at reviewing the security solutions implemented in this area for further applications.
Unable to display preview. Download preview PDF.
- 3GPP TS 33.102 V3.11.0, “Security Architecture”, 3rd Generation Partnership Project, Technical Specification Group, 3G Security, Valbonne, France, 2002, http://www.3gpp.org/ftp/Specs/2002-03/R1999/33_series/33102-3b0.zip.
- A. BIRYUKOV, A. SHAMIR, “Real time cryptanalysis of the alleged A5/1 on a PC”, preliminary draft, December 1999.Google Scholar
- A. BIRYUKOV, A. SHAMIR, D. WAGNER, “Real time cryptanalysis of A5/1 on a PC”, in FSE 2000, LNCS No. 1978, Springer Verlag, Berlin, 2000.Google Scholar
- C. BROOKSON, “GSM (and PCN) Security and Encryption”, 1994, http://www.brookson.com/gsm/gsmdoc.htm.
- ETSI TS 35 202 V4.0.0, “Universal Mobile Telecommunications System (UMTS); Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi algorithm specification”, http://www.etsi.org/ dvbandca/3GPP/3gppspecs.htm.
- P. HOWARD, “GSM and 3G Security”, lecture notes, Royal Holloway, University of London, 19 Nov 2001, http://www.isg.rhbnc.ac.uk/msc/teaching/is3/is3.shtml.
- C. MITCHELL et. al., “Link 3GS3 Technical Report 2: Security Mechanisms for Third Generation Systems”, Vodafone, GPT and RHUL, 15/05/96, pp. 25 and 92.Google Scholar
- C. MITCHELL, “The security of the GSM air interface protocol”, Technical Report, RHUL-MA-2001-3, 18 August 2001.Google Scholar
- J. R. RAO, P. ROHATGI AND H. SCHERZER, “Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards”, IBM Watson Research Center, in 2002 IEEE Symposium on Security and Privacy, Oakland, CA, May 2002.Google Scholar
- R. SCHMITZ, “SHAMAN Deliverable D02-Intermediate Report: Results of review, Requirements and reference Architecture”, Information Society Technologies, 08 November 2001, pp. 41–42.Google Scholar
- S. SKOROBOGATOV, R. ANDERSON, “Optical Fault Induction Attacks”, University of Cambridge, in 2002 IEEE Symposium on Security and Privacy, Oakland, May 2002.Google Scholar
- M. WALKER AND T. WRIGHT, “Security”, in F. Hillebrand, editor, GSM and UMTS: The Creation of Global Mobile Communication, pp. 385–406, John Wiley & Sons, New York, 2002.Google Scholar