Back to Results
First PageMeta Content
Universal Mobile Telecommunications System / GSM / Subscriber identity module / A5/1 / UMTS security / Roaming / SMS / COMP128 / Mobile Network Code / Technology / Mobile technology / Electronic engineering


Solutions to the GSM Security Weaknesses † Mohsen Toorani ‡
Add to Reading List

Document Date: 2012-03-16 17:40:39


Open Document

File Size: 327,48 KB

Share Result on Facebook

City

Cardiff / /

Company

IBM / A8 / Securing SS7 Telecommunications Networks / Real-Time Interception Systems / John Wiley and Sons / A3 / /

Country

Turkey / United Kingdom / /

/

Facility

Mobile Station / University of Glamorgan / /

IndustryTerm

symmetric encryption algorithm / cellular systems / applicable solutions / Internet protocols / deployed cryptographic algorithms / The cryptographic algorithms / 3G systems / legitimate network / offered applications / secure algorithms / wireless communications / hardware manufacturers / secure hardware / upper generation networks / secure voice communications / Remote management / 2G systems / Wireless Public Key Infrastructure / huge uncontrolled network / session-oriented technology / improved processing capabilities / secure wireless system / call setup protocol / secure ciphering algorithms / web servers / Wireless Application Protocol / 2G networks / secure enough cryptographic algorithm / deployed cryptographic algorithm / research / chip hardware / cryptographic algorithms / security services / huge processing / encryption algorithms / mobile manufacturer / Web server / profitable solution / wireless links / operators using 2G systems / Wireless Security / authentication protocols / software application / /

OperatingSystem

DoS / /

Organization

European Telecommunications Standards Institute / Smartcard Developer Association / Enhanced Messaging Service / University of Glamorgan / CEPT / Multimedia Messaging Service / General Packet Radio Service / Global Service for Mobile / /

Person

Mohsen Toorani / /

Position

Corresponding Author / interpreter / Forward / /

Product

COMP128 / /

ProgrammingLanguage

Java / /

ProvinceOrState

Mississippi / /

Technology

home network / symmetric encryption algorithm / Three algorithms / Public Key Infrastructure / over-the-air encryption / SMS / encryption algorithms / wireless communications / Kasumi algorithm / GSM protocols / asymmetric encryption / block cipher / call setup protocol / A5/2 algorithms / GSM system / UMTS algorithms / smart card / Internet protocols / cloning / mobile phones / deployed cryptographic algorithm / operating system / UDP / A5 algorithm / SSL / session-oriented technology / TCP/IP / deployed cryptographic algorithms / secure enough cryptographic algorithm / deployed protocols / encryption / cellular telephone / WAP / deployed algorithms / Java / authentication protocols / ciphering algorithms / frequency hopping / corresponding WAP protocols / symmetric and asymmetric encryption / HTTP / secure ciphering algorithms / COMP128-3 algorithms / The cryptographic algorithms / GSM / GSM Protocol / COMP128 algorithm / PDA / 3G / cryptographic algorithms / SS7 system / Web server / SS7 / /

URL

http /

SocialTag