IRJET-Implementing Encryption Algorithm for Addressing GSM Security Issues (original) (raw)

Secure Voice Communication via GSM Network

In this study, a system is developed which communicates through GSM mobile phones and provides protection for interviews against third parties including with service providers developed. GSM line is sensitive to human speech to be more efficient and provide more quality for transmission. In addition, a tool should be used to compress speech to transmit speech over GSM. For these reasons, speech cannot be transmitted to the GSM line directly after encrypted. In this study, the encrypted speech which is a digital data stream, formed speech like waveform by the designed coder to transmit through the GSM line. FPGA implementation of AES is used for encryption of digital data stream. Desired speech characteristics are obtained by scanning the database of NTIMIT, and then LBG algorithm is used to design codebooks which include speech parameters. A coder is designed to synthesize speech like waveforms from the encrypted digital data stream.

Implementation of Cryptographic Algorithms for GSM Cellular Standard

GSM is most widely used cellular standard in the world. Mobile network is the shared media and any user of the media can intercept the network. When the media are shared, any one can listen to or transmit on the media. Thus communication is no longer private. When media are shared, privacy and authentication are lost unless some method is established to regain it. Cryptography provides the mean to regain control over privacy and authentication. A5/x are the encryption algorithms used in order to ensure privacy of conversations on GSM mobile phones. A5/x algorithms to secure the information sent over the air interface. The strong version A5/1 is used in most countries. A5/2 is weaker version used in countries on which export restrictions apply. A5/3 encryption algorithm used for GSM and ECSD and GEA3 encryption algorithm for GPRS. The following paper is based on simulation of A5/1 and A5/3 algorithms.

Design and Development of Secure Mobile Communication over GSM Network using Open Source Operating System (OS

—With the rapidly advancing technology of today, exchange of information and data is a very pertinent matter. The world has just recently witnessed the effects of information leakage through the issue of WikiLeaks. There are huge amounts of data being shared over different platforms nowadays. Global System for Mobile Communication (GSM) is one of the most reliable platforms known to and used by almost all people in the world for text as well as voice communication. With the tools like Android Studio and NetBeans available, it is now possible to encrypt the text that has to be sent over the GSM, so that it can be decrypted at the other end of the communication path. However, the encryption and decryption of voice being transmitted over the GSM network still remains a question. In the domain of real time voice encryption, much of the work being carried out pertains to the voice being exchanged through the Internet Protocol. As compared to the Voice over Internet Protocol (VoIP), voice over the GSM network has not seen much research work related to its security aspects. The purpose of this paper is to document the results of a project aimed at developing a platform for mobile phones in order to communicate over the GSM network in a secure manner. The most suitable method for achieving the above mentioned objective is to use an open source Operating System (OS), so that the source code is easily accessible and usable. In this paper, the Android OS will be under discussion, which is compatible with all the Android mobile phones. In this way, the maximum number of mobile phone users can be benefitted because Android cell phones are being widely used nowadays. The use of cryptographic algorithms for securing the voice communication over the GSM network is also a part of this paper. The work revolves around the Java programming language since the Android application development has been carried out in Java through the use of Android Studio. Also, NetBeans has been employed for developing algorithms for voice encryption.

Secured Audio Encryption using AES Algorithm

International Journal of Computer Applications

Speech to text conversion is the process of converting spoken words into written texts. In this paper, a voice encryption system is developed as a real-time software application. Basically, the speech is taken as an input and is encoded to be decoded by authenticated users only. The algorithm used to perform this cryptography is Advanced Encryption Standards (AES). This algorithm has its own particular structure to encrypt and decrypt sensitive data and is applied in hardware and software all over the world. We take the information in the form of audio as an input using a microphone which is to be transmitted over the channel to the intended receiver. The audio input is converted into text format which ensures speech-to-text conversion. Then, the text is encrypted using the AES algorithm to form cipher text. This cipher text is sent over a channel to the receiver. The receiver requests to perform decryption of the information only if he has the correct secret key otherwise the request is declined. If the key matches, the decryption is successful and the receiver get the message as text. For 128 bit, about 2128 attempts are needed to break. This makes it very difficult to hack it as a result it is very safe protocol.

Secure Data and Voice Transmission over GSM Voice Channel: Applications for Secure Communications

The GSM voice channel is the world's most widely used mobile communication network. Unfortunately these networks are affected by serious vulnerability from hardware-based attacks and communications can be easy to intercept. This paper describes a prototype implementation of a device which enables secure data and voice transmission over GSM voice channel network. The proposed system is supposed to interact with every cell phone or mobile device connected to the GSM network, differentiating itself from the best-known crypto-phone category. In the following, we will highlight the particular modulation strategy used to generate a specific wave-form that allows the receiver to correctly decipher data with a very low BER. In conclusion, this work aims to define the principles to model a secure infrastructure over a GSM network

Implementation of El-Gamal algorithm for speech signals encryption and decryption

Procedia Computer Science, 2020

In the applications of Internet and wireless communication network, information security is one of the most challenging aspects. Cryptography is the best solution that offers the requisite protection from unintended persons. By using encryption and decryption mechanisms, cryptography can convert the data form its readable form to unreadable one so that only the intended receiver can read the message and alter it. By this way, one can ensure that message can be sent or stored without any modification. The presented work is concerned with a particular type of asymmetric key cryptography called El-Gamal algorithm to be used for speech signals encryption and decryption. First, the speech signal is encrypted by employing El-Gamal algorithm throughout encryption process at the sender and then transmitted to the particular recipient. Second, the recipient will recover the original signal throughout the decryption process. The cryptosystem performance is evaluated via different quality measures for audio signals encryption/decryption including Signal to Noise Ratio, Segmental Signal to Noise-Ratio and Log-Likelihood Ratio that are reach to-35.0224 dB,-38.0201 dB and 2.1145 respectively for the encrypted signal. The given results confirm the effectiveness of the presented scheme and robustness against noise effect.

Implimentation of Cryptographic Algorithm for GSM and UMTS Systems

International Journal of Network Security & Its Applications, 2011

1 alpeshrs@yahoo.com, 2 vive@eced.svnit.ac.in and 3 asm@eced.svnit.ac.in Abstract-Due to extremely high demand of mobile phones among people, over the years there has been a great demand for the support of various applications and security services. Cryptographic algorithms used by Mobile Subscribers to protect the privacy of their cellular voice and data communication. Ciphering provides the mean to regain control over privacy and authentication. A5/x are the encryption algorithms used in order to ensure privacy of conversations on mobile phones. A5/3 encryption algorithm used for 3G and GEA3 encryption algorithm used for GPRS. f8 is confidentiality algorithms developed by 3GPP used in UMTS System. The following paper is based on simulation of A5/3 and f8 algorithms.

Algorithmic Approach to Encrypted Modes of Transmission of Real Time Media in a VOIP Architecture

2018

Transmission of voice , video and messages over a secured channel of communication has become the priority of the companies emphasising on individualised privacy and support for the customers. Due to an increasing amount of security issues in the VoIP Platform,more technological advances and methods are being exercised to control the security parameters. This research paper is a study of the different modes of encryption of Advanced Encryption standard and generation of Time based one time password. This paper integrates these methods in providing an algorithmic approach to the transmission of voice, video and messages in an encrypted mode in a Client server architectural environment. This research paper integrates the Pycrypto implementation of the AES mechanism. This method is then implemented in a Voice client server architectural environment to provide a secured implementation of three factor authentication mechanism. The process uses the services of a Voice cloud service provid...

Development of a Cryptographic Dongle for Secure Voice Encryption over GSM Voice Channel

J. Inform. and Commun. Convergence Engineering, 2009

A cryptographic dongle, which is capable of transmitting encrypted voice signals over the CDMA/GSM voice channel, was designed and implemented. The dongle used PIC microcontroller for signals processing including analog to digital conversion and digital to analog conversion, encryption and communicating with the smart phone. A smart phone was used to provide power to the dongle as well as passing the encrypted speech to the smart phone which then transmits the signal to the network. A number of tests were conducted to check the efficiency of the dongle, the firmware programming, the encryption algorithms, and the secret key management system, the interface between the smart phone and the dongle and the noise level.

IRJET-Securing Mobile Technology of GSM using A5/1 Algorithm

The security and the authentication mechanism are very important in mobile networks since the GSM networks are susceptible to several attacks aiming to penetrate the conversation and access to data transmitted through the network. The mechanisms involved in security used to protect subscribers and service providers. The main aspects of the system that need protection are described,provided with the implementation of mechanisms used for the protection. The authentication mechanisms may even be attacked. Either by having physical access to the smart card or over the air interface, it is possible to clone a subscription. Base station functionality is required to clone a subscription over the air. Eavesdropping is the most evident threat against communication systems. The users on GSM network are provided with the GSM security and encryption algorithms for authentication and radio link privacy. One of the elements of the GSM network security is the encryption algorithm where it depends on the encryption algorithm A5/1 which is the strong encryption algorithm used for encryption of conversations on GSM mobile phones. The structure of this algorithm depends on the block cipher. The aim of this thesis is to improve GSM network security in order to overcome the weakness which appears in clocking mechanism that used in A5/1 stream cipher.New S-box generation is proposed to improve the efficiency of A5/1 majority function. The output bit-stream generated by the proposed stream cipher improves the performance.