Paper Search Console

Home Search Page About Contact

Journal Title

Title of Journal:

Search In Journal Title:

Abbravation:

Search In Journal Abbravation:

Publisher

Springer, Berlin, Heidelberg

Search In Publisher:

DOI

10.1007/bf02384226

Search In DOI:

ISSN

Search In ISSN:
Search In Title Of Papers:

Retracted Secure Conversation Using Cryptographic

Authors: Alpesh R Sankaliya V Mishra Abhilash Mandloi
Publish Date: 2011/7/15
Volume: , Issue: , Pages: 396-406
PDF Link

Abstract

Cryptographic algorithms used by Mobile Subscribers to protect the privacy of their cellular voice and data communication Mobile network is the shared media When media are shared privacy and authentication are lost unless some method is established to regain it Ciphering provides the mean to regain control over privacy and authentication A5/x are the encryption algorithms used in order to ensure privacy of conversations on mobile phones The strong version A5/1 is used in most countries A5/2 is weaker version used in countries on which export restrictions apply A5/3 encryption algorithm used for 3G and GEA3 encryption algorithm used for GPRS f8 is confidentiality algorithms developed by 3GPP bringing out the commonality between A5/3 and GEA3 algorithms The following paper is based on simulation of A5/1 A5/3 and f8 algorithms


Keywords:

References


.
Search In Abstract Of Papers:
Other Papers In This Journal:


    Search Result: