Skip to main content

A Contemporary Foreword on GSM Security

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2437))

Abstract

This article contains a current outline of the GSM system security, with focus on the air interface protocol. It presents the terminology and describes the GSM security operation, including its principles and features. This document also discusses the effectiveness of GSM authentication and the strength of GSM encryption. It includes therefore the most significant physical and cryptanalytic attacks on GSM security mechanisms, such as the up to date optical fault induction and partitioning attacks. GSM security features retained and enhanced for the 3G Security and further applications in network (Internet) remote access are also contemplated. This article aims primarily at contributing to a progressive research in mobile systems security and at reviewing the security solutions implemented in this area for further applications.

GSM was formerly acronym for Groupe Spéciale Mobile (founded 1982). Now is acronym for Global System for Mobile Communications (http://www.gsmworld.com).

2 3GPP (3rd Generation Partnership Project) is a partnership project including: ETSI (Europe), ARIB & TTA (Japan), TTC (Korea) and T1P1 (USA).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 3GPP TS 33.102 V3.11.0, “Security Architecture”, 3rd Generation Partnership Project, Technical Specification Group, 3G Security, Valbonne, France, 2002, http://www.3gpp.org/ftp/Specs/2002-03/R1999/33_series/33102-3b0.zip .

  2. A. BIRYUKOV, A. SHAMIR, “Real time cryptanalysis of the alleged A5/1 on a PC”, preliminary draft, December 1999.

    Google Scholar 

  3. A. BIRYUKOV, A. SHAMIR, D. WAGNER, “Real time cryptanalysis of A5/1 on a PC”, in FSE 2000, LNCS No. 1978, Springer Verlag, Berlin, 2000.

    Google Scholar 

  4. C. BROOKSON, “GSM (and PCN) Security and Encryption”, 1994, http://www.brookson.com/gsm/gsmdoc.htm .

  5. ETSI TS 35 202 V4.0.0, “Universal Mobile Telecommunications System (UMTS); Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi algorithm specification”, http://www.etsi.org/ dvbandca/3GPP/3gppspecs.htm .

  6. P. HOWARD, “GSM and 3G Security”, lecture notes, Royal Holloway, University of London, 19 Nov 2001, http://www.isg.rhbnc.ac.uk/msc/teaching/is3/is3.shtml .

  7. M. MATSUI, “New block encryption algorithm MISTY”, in Fast Software Encryption’ 97, Lecture Notes in Computer Science No. 1267, Springer-Verlag, 1997, pp. 54–68.

    Chapter  Google Scholar 

  8. C. MITCHELL et. al., “Link 3GS3 Technical Report 2: Security Mechanisms for Third Generation Systems”, Vodafone, GPT and RHUL, 15/05/96, pp. 25 and 92.

    Google Scholar 

  9. C. MITCHELL, “The security of the GSM air interface protocol”, Technical Report, RHUL-MA-2001-3, 18 August 2001.

    Google Scholar 

  10. J. R. RAO, P. ROHATGI AND H. SCHERZER, “Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards”, IBM Watson Research Center, in 2002 IEEE Symposium on Security and Privacy, Oakland, CA, May 2002.

    Google Scholar 

  11. R. SCHMITZ, “SHAMAN Deliverable D02-Intermediate Report: Results of review, Requirements and reference Architecture”, Information Society Technologies, 08 November 2001, pp. 41–42.

    Google Scholar 

  12. S. SKOROBOGATOV, R. ANDERSON, “Optical Fault Induction Attacks”, University of Cambridge, in 2002 IEEE Symposium on Security and Privacy, Oakland, May 2002.

    Google Scholar 

  13. M. WALKER AND T. WRIGHT, “Security”, in F. Hillebrand, editor, GSM and UMTS: The Creation of Global Mobile Communication, pp. 385–406, John Wiley & Sons, New York, 2002.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pagliusi, P.S. (2002). A Contemporary Foreword on GSM Security. In: Davida, G., Frankel, Y., Rees, O. (eds) Infrastructure Security. InfraSec 2002. Lecture Notes in Computer Science, vol 2437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45831-X_10

Download citation

  • DOI: https://doi.org/10.1007/3-540-45831-X_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44309-4

  • Online ISBN: 978-3-540-45831-9

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics