Please use this identifier to cite or link to this item:
http://10.1.7.192:80/jspui/handle/123456789/5506
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Upadhyay, Darshana | - |
dc.contributor.author | Shah, Ankit | - |
dc.contributor.author | Sharma, Priyanka | - |
dc.date.accessioned | 2015-07-10T05:59:56Z | - |
dc.date.available | 2015-07-10T05:59:56Z | - |
dc.date.issued | 2014 | - |
dc.identifier.citation | Sixth International Conference on Computational Intelligence and Communication Networks, 2014 | en_US |
dc.identifier.issn | 978-1-4799-6929-6/14 | - |
dc.identifier.issn | 10.1109/CICN.2014.196 (DOI) | - |
dc.identifier.uri | http://hdl.handle.net/123456789/5506 | - |
dc.description.abstract | Abstract—With the increase in wireless communication technology, encryption of information sent has become a major concern. This involves both the software level and hardware level encryption. GSM was the first cellular system that paid attention to secure mobile communication. Before the advent of GSM the cellular system had no particular security. The GSM voice calls are encrypted using a family of algorithms collectively A5 all of which are currently badly broken. This paper covers the software simulation of A5/1 algorithm and the complexity of various simulators used. As per the analysis serious security weakness are found in A5/1 algorithm. These simulation work as a base for improving the security of A5/1 algorithm. The justification of any enhancement to algorithm lies in effective simulation of enhancement. Thus, this paper gives comparative analysis of various simulation techniques. NIST - Security Test suite is used for cryptographic analysis of the algorithm. | en_US |
dc.publisher | IEEE | en_US |
dc.relation.ispartofseries | ITFIT012-4; | - |
dc.subject | LFSR | en_US |
dc.subject | Stream Cipher | en_US |
dc.subject | Randomness Tests | en_US |
dc.subject | A5/1 Algorithm | en_US |
dc.subject | Simulation | en_US |
dc.subject | Key Stream Generator | en_US |
dc.subject | Computer Faculty Paper | en_US |
dc.subject | Faculty Paper | en_US |
dc.subject | ITFIT012 | en_US |
dc.subject | ITFCE011 | en_US |
dc.title | Design,Implementation and Analysis of GSM stream cipher : Software simulators vs real test bed - FPGA | en_US |
dc.type | Faculty Papers | en_US |
Appears in Collections: | Faculty Papers, CE |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ITFIT012-4.pdf | ITFIT012-4 | 296.96 kB | Adobe PDF | ![]() View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.