Authentication and Encryption in GSM and 3GUMTS: An Emphasis on Protocols and Algorithms. Elouafiq, A. arXiv:1204.1651 [cs], April, 2012. arXiv: 1204.1651Paper abstract bibtex Mobile communication touches every aspect of our life, it become one of the major dependencies that the 21st Century civilizations rely on. Thereby, security is a major issue that should be targeted by communication technologies. In this paper we will target authentication and encryption in GSM and 3G/UMTS. In order to understand clearly how things work, we will start by presenting the architecture of each network, its major components, its authentication algorithms, protocols used, and KASUMI Block Cipher.
@article{elouafiq_authentication_2012,
title = {Authentication and {Encryption} in {GSM} and {3GUMTS}: {An} {Emphasis} on {Protocols} and {Algorithms}},
shorttitle = {Authentication and {Encryption} in {GSM} and {3GUMTS}},
url = {http://arxiv.org/abs/1204.1651},
abstract = {Mobile communication touches every aspect of our life, it become one of the major dependencies that the 21st Century civilizations rely on. Thereby, security is a major issue that should be targeted by communication technologies. In this paper we will target authentication and encryption in GSM and 3G/UMTS. In order to understand clearly how things work, we will start by presenting the architecture of each network, its major components, its authentication algorithms, protocols used, and KASUMI Block Cipher.},
urldate = {2018-09-02},
journal = {arXiv:1204.1651 [cs]},
author = {Elouafiq, Ali},
month = apr,
year = {2012},
note = {arXiv: 1204.1651},
keywords = {3g, Computer Science - Cryptography and Security, Computer Science - Networking and Internet Architecture, gsm, umts}
}
Downloads: 0
{"_id":"2CLJrAzXtySrEkE9X","bibbaseid":"elouafiq-authenticationandencryptioningsmand3gumtsanemphasisonprotocolsandalgorithms-2012","downloads":0,"creationDate":"2018-09-02T09:38:26.279Z","title":"Authentication and Encryption in GSM and 3GUMTS: An Emphasis on Protocols and Algorithms","author_short":["Elouafiq, A."],"year":2012,"bibtype":"article","biburl":"https://bibbase.org/zotero/21h","bibdata":{"bibtype":"article","type":"article","title":"Authentication and Encryption in GSM and 3GUMTS: An Emphasis on Protocols and Algorithms","shorttitle":"Authentication and Encryption in GSM and 3GUMTS","url":"http://arxiv.org/abs/1204.1651","abstract":"Mobile communication touches every aspect of our life, it become one of the major dependencies that the 21st Century civilizations rely on. Thereby, security is a major issue that should be targeted by communication technologies. In this paper we will target authentication and encryption in GSM and 3G/UMTS. In order to understand clearly how things work, we will start by presenting the architecture of each network, its major components, its authentication algorithms, protocols used, and KASUMI Block Cipher.","urldate":"2018-09-02","journal":"arXiv:1204.1651 [cs]","author":[{"propositions":[],"lastnames":["Elouafiq"],"firstnames":["Ali"],"suffixes":[]}],"month":"April","year":"2012","note":"arXiv: 1204.1651","keywords":"3g, Computer Science - Cryptography and Security, Computer Science - Networking and Internet Architecture, gsm, umts","bibtex":"@article{elouafiq_authentication_2012,\n\ttitle = {Authentication and {Encryption} in {GSM} and {3GUMTS}: {An} {Emphasis} on {Protocols} and {Algorithms}},\n\tshorttitle = {Authentication and {Encryption} in {GSM} and {3GUMTS}},\n\turl = {http://arxiv.org/abs/1204.1651},\n\tabstract = {Mobile communication touches every aspect of our life, it become one of the major dependencies that the 21st Century civilizations rely on. Thereby, security is a major issue that should be targeted by communication technologies. In this paper we will target authentication and encryption in GSM and 3G/UMTS. In order to understand clearly how things work, we will start by presenting the architecture of each network, its major components, its authentication algorithms, protocols used, and KASUMI Block Cipher.},\n\turldate = {2018-09-02},\n\tjournal = {arXiv:1204.1651 [cs]},\n\tauthor = {Elouafiq, Ali},\n\tmonth = apr,\n\tyear = {2012},\n\tnote = {arXiv: 1204.1651},\n\tkeywords = {3g, Computer Science - Cryptography and Security, Computer Science - Networking and Internet Architecture, gsm, umts}\n}\n\n","author_short":["Elouafiq, A."],"key":"elouafiq_authentication_2012","id":"elouafiq_authentication_2012","bibbaseid":"elouafiq-authenticationandencryptioningsmand3gumtsanemphasisonprotocolsandalgorithms-2012","role":"author","urls":{"Paper":"http://arxiv.org/abs/1204.1651"},"keyword":["3g","Computer Science - Cryptography and Security","Computer Science - Networking and Internet Architecture","gsm","umts"],"downloads":0,"html":""},"search_terms":["authentication","encryption","gsm","3gumts","emphasis","protocols","algorithms","elouafiq"],"keywords":["3g","computer science - cryptography and security","computer science - networking and internet architecture","gsm","umts"],"authorIDs":[],"dataSources":["NpxDwkFvCjNmGYFSj"]}