z-logo
open-access-imgOpen Access
Gsm Encryption Algorithm Emulation Using Neuro-Identifire
Author(s) -
Mahmood Khalel Ibrahem Al Ubaidy
Publication year - 2012
Publication title -
journal of al-nahrain university-science
Language(s) - English
Resource type - Journals
eISSN - 2519-0881
pISSN - 1814-5922
DOI - 10.22401/jnus.15.3.28
Subject(s) - computer science , encryption , gsm , algorithm , computer security model , emulation , key (lock) , set (abstract data type) , cryptography , theoretical computer science , computer security , computer network , economics , programming language , economic growth
The security model of the Global System for Mobile Communication (GSM) relies on security through obscurity (STO). The later is a controversial principal in security engineering based on the premise that security of an element or function can ensure security of the whole product. STO assumption breaks one of the basic requirements of cryptographic system (Kerckhoff’s assumption), which states that the security of the cryptographic system should lies solely on the key, and the algorithm should be assumed as publicly available. In this research, security through obscurity, Kerckhoff’s assumption and GSM encryption algorithm (A5) will be discussed. The target unknown encryption algorithm (A5) is constructed using a black-box approach with neuroidentifier and a set of input and output data only. The constructed algorithm then is tested and compared with actual unknown algorithm. The experimental results of the research demonstrate nearly complete similarities between both algorithms, which prove that a GSM security model cannot be secure through obscuring algorithms.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom