Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
Repository logo
  • Communities & Collections
  • All of DSpace
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Bajeh, Amos Orenyn"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • Item
    Development of a Model for the implementation of GSM Algorithm
    (Mathematical Association of Nigeria., 2009) Abikoye, Oluwakemi Christiana; Bajeh, Amos Orenyn
    The motivations for security in cellular Telecommunication systems are to secure conversations and signaling data from interception as well as to prevent cellular telephone fraud. With the older analog-based cellular telephone systems such as Advanced Mobile Phone System and the Total access communication System, all these motivation were not achieved. Another security consideration with cellular telecommunications systems involves identification credentials such as the Electronic Serial number, which are transmitted “in the clear”. In analog systems. With more complicated equipment, it is possible to receive the Electronic Serial Number and use it to commit cellular telephone fraud by “cloning” another cellular phone and placing calls with it. This led to the development of digital technologies, with the advent of digital technologies, wireless voice communications are much difficult to intercept than analog systems. GSM is a standard for a digital mobile cellular communication. In this paper, the three different GSM security algorithms namely, A3, A5 and A8 were studied and we present a computer model for one of the three GSM security algorithms known as A3(User authentication) algorithm. The model is implemented using Visual Basic 6.0 Programming Language.

University of Ilorin Library © 2024, All Right Reserved

  • Cookie settings
  • Send Feedback
  • with ❤ from dspace.ng