Abikoye, Oluwakemi ChristianaBajeh, Amos Orenyn2018-06-202018-06-202009Abikoye, O.C. & Bajeh, A.O. (2009): Development of a model for the implementation of GSM Security Algorithm. Journal of Mathematical Association of Nigeria, ABACUS. 36(2); 89-99, Published by Mathematical Association of Nigeria.http://hdl.handle.net/123456789/682The motivations for security in cellular Telecommunication systems are to secure conversations and signaling data from interception as well as to prevent cellular telephone fraud. With the older analog-based cellular telephone systems such as Advanced Mobile Phone System and the Total access communication System, all these motivation were not achieved. Another security consideration with cellular telecommunications systems involves identification credentials such as the Electronic Serial number, which are transmitted “in the clear”. In analog systems. With more complicated equipment, it is possible to receive the Electronic Serial Number and use it to commit cellular telephone fraud by “cloning” another cellular phone and placing calls with it. This led to the development of digital technologies, with the advent of digital technologies, wireless voice communications are much difficult to intercept than analog systems. GSM is a standard for a digital mobile cellular communication. In this paper, the three different GSM security algorithms namely, A3, A5 and A8 were studied and we present a computer model for one of the three GSM security algorithms known as A3(User authentication) algorithm. The model is implemented using Visual Basic 6.0 Programming Language.enGSMdigital technologiessecurityalgorithmA3A8A5Development of a Model for the implementation of GSM AlgorithmArticle