Abstract
This article contains a current outline of the GSM system security, with focus on the air interface protocol. It presents the terminology and describes the GSM security operation, including its principles and features. This document also discusses the effectiveness of GSM authentication and the strength of GSM encryption. It includes therefore the most significant physical and cryptanalytic attacks on GSM security mechanisms, such as the up to date optical fault induction and partitioning attacks. GSM security features retained and enhanced for the 3G Security and further applications in network (Internet) remote access are also contemplated. This article aims primarily at contributing to a progressive research in mobile systems security and at reviewing the security solutions implemented in this area for further applications.
GSM was formerly acronym for Groupe Spéciale Mobile (founded 1982). Now is acronym for Global System for Mobile Communications (http://www.gsmworld.com).
2 3GPP (3rd Generation Partnership Project) is a partnership project including: ETSI (Europe), ARIB & TTA (Japan), TTC (Korea) and T1P1 (USA).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
3GPP TS 33.102 V3.11.0, “Security Architecture”, 3rd Generation Partnership Project, Technical Specification Group, 3G Security, Valbonne, France, 2002, http://www.3gpp.org/ftp/Specs/2002-03/R1999/33_series/33102-3b0.zip .
A. BIRYUKOV, A. SHAMIR, “Real time cryptanalysis of the alleged A5/1 on a PC”, preliminary draft, December 1999.
A. BIRYUKOV, A. SHAMIR, D. WAGNER, “Real time cryptanalysis of A5/1 on a PC”, in FSE 2000, LNCS No. 1978, Springer Verlag, Berlin, 2000.
C. BROOKSON, “GSM (and PCN) Security and Encryption”, 1994, http://www.brookson.com/gsm/gsmdoc.htm .
ETSI TS 35 202 V4.0.0, “Universal Mobile Telecommunications System (UMTS); Specification of the 3GPP confidentiality and integrity algorithms; Document 2: Kasumi algorithm specification”, http://www.etsi.org/ dvbandca/3GPP/3gppspecs.htm .
P. HOWARD, “GSM and 3G Security”, lecture notes, Royal Holloway, University of London, 19 Nov 2001, http://www.isg.rhbnc.ac.uk/msc/teaching/is3/is3.shtml .
M. MATSUI, “New block encryption algorithm MISTY”, in Fast Software Encryption’ 97, Lecture Notes in Computer Science No. 1267, Springer-Verlag, 1997, pp. 54–68.
C. MITCHELL et. al., “Link 3GS3 Technical Report 2: Security Mechanisms for Third Generation Systems”, Vodafone, GPT and RHUL, 15/05/96, pp. 25 and 92.
C. MITCHELL, “The security of the GSM air interface protocol”, Technical Report, RHUL-MA-2001-3, 18 August 2001.
J. R. RAO, P. ROHATGI AND H. SCHERZER, “Partitioning Attacks: Or How to Rapidly Clone Some GSM Cards”, IBM Watson Research Center, in 2002 IEEE Symposium on Security and Privacy, Oakland, CA, May 2002.
R. SCHMITZ, “SHAMAN Deliverable D02-Intermediate Report: Results of review, Requirements and reference Architecture”, Information Society Technologies, 08 November 2001, pp. 41–42.
S. SKOROBOGATOV, R. ANDERSON, “Optical Fault Induction Attacks”, University of Cambridge, in 2002 IEEE Symposium on Security and Privacy, Oakland, May 2002.
M. WALKER AND T. WRIGHT, “Security”, in F. Hillebrand, editor, GSM and UMTS: The Creation of Global Mobile Communication, pp. 385–406, John Wiley & Sons, New York, 2002.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pagliusi, P.S. (2002). A Contemporary Foreword on GSM Security. In: Davida, G., Frankel, Y., Rees, O. (eds) Infrastructure Security. InfraSec 2002. Lecture Notes in Computer Science, vol 2437. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45831-X_10
Download citation
DOI: https://doi.org/10.1007/3-540-45831-X_10
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-44309-4
Online ISBN: 978-3-540-45831-9
eBook Packages: Springer Book Archive