Journal Title
Title of Journal:
|
|
Publisher
Springer, Berlin, Heidelberg
|
|
|
|
Authors: Alpesh R Sankaliya V Mishra Abhilash Mandloi
Publish Date: 2011/7/15
Volume: , Issue: , Pages: 396-406
Abstract
Cryptographic algorithms used by Mobile Subscribers to protect the privacy of their cellular voice and data communication Mobile network is the shared media When media are shared privacy and authentication are lost unless some method is established to regain it Ciphering provides the mean to regain control over privacy and authentication A5/x are the encryption algorithms used in order to ensure privacy of conversations on mobile phones The strong version A5/1 is used in most countries A5/2 is weaker version used in countries on which export restrictions apply A5/3 encryption algorithm used for 3G and GEA3 encryption algorithm used for GPRS f8 is confidentiality algorithms developed by 3GPP bringing out the commonality between A5/3 and GEA3 algorithms The following paper is based on simulation of A5/1 A5/3 and f8 algorithms
Keywords:
.
|
Other Papers In This Journal:
|