Computational Analysis of GSM Security Algorithm

dc.contributor.authorAbikoye, Oluwakemi Christiana
dc.contributor.authorOluwade, Dele
dc.date.accessioned2018-03-21T10:51:16Z
dc.date.available2018-03-21T10:51:16Z
dc.date.issued2008
dc.description.abstractThe security and authentication mechanisms incorporated in the Global System of Mobile Network (GSM) make it the most secure mobile communication standard currently available, particularly in comparison to the analog systems. GSM security and encryption algorithm are used to provide authentication and radio link privacy to users on GSM network. Security in GSM consists of the following aspects: subscriber identity authentication, subscriber identity confidentiality, signaling data confidentiality, and user data confidentiality. These various security aspects are addressed by the user authentication algorithm(called A3), the signal encryption algorithm(A5) and the encryption key generation algorithm(A8). Both A3 and A8 algorithms are similar in functionality and are commonly implemented as a single algorithm called COMP128. In this paper, a computational time complexity analysis of COMP 128 is performed. It is shown that the running time of user authentication algorithm COMP128 is constant, meaning that the number of executions of basic operations in COMP128 algorithm is fixed and so the total time is bounded by a constanten_US
dc.identifier.citationAbikoye, O.C. & Oluwade, Dele. (2008): Computational Analysis of GSM Security Algorithm. African Journal of Computing & ICT (IEEE Nigeria Computer Chapter). 1 (3); 27-33en_US
dc.identifier.urihttp://www.ajocict.net/uploads/V1N2P2_-_2008_-_AJOCICT_-COMPUTATIONAL_ANALYSIS_OF_GSM_SECURITY.pdf
dc.identifier.urihttp://hdl.handle.net/123456789/157
dc.language.isoenen_US
dc.publisherPublished by the IEEE Nigeria Computer Chapter.en_US
dc.subjectComputational complexityen_US
dc.subjectCOMP128en_US
dc.subjectGSMen_US
dc.subjectSecurityen_US
dc.subjectAlgorithmen_US
dc.subjectA3en_US
dc.subjectA8en_US
dc.titleComputational Analysis of GSM Security Algorithmen_US
dc.typeArticleen_US

Files

Original bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
Computational analysis.pdf
Size:
53.82 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.69 KB
Format:
Item-specific license agreed upon to submission
Description:

Collections