Authentication and Encryption in GSM and 3GUMTS: An Emphasis on Protocols and Algorithms. Elouafiq, A. arXiv:1204.1651 [cs], April, 2012. arXiv: 1204.1651
Authentication and Encryption in GSM and 3GUMTS: An Emphasis on Protocols and Algorithms [link]Paper  abstract   bibtex   
Mobile communication touches every aspect of our life, it become one of the major dependencies that the 21st Century civilizations rely on. Thereby, security is a major issue that should be targeted by communication technologies. In this paper we will target authentication and encryption in GSM and 3G/UMTS. In order to understand clearly how things work, we will start by presenting the architecture of each network, its major components, its authentication algorithms, protocols used, and KASUMI Block Cipher.
@article{elouafiq_authentication_2012,
	title = {Authentication and {Encryption} in {GSM} and {3GUMTS}: {An} {Emphasis} on {Protocols} and {Algorithms}},
	shorttitle = {Authentication and {Encryption} in {GSM} and {3GUMTS}},
	url = {http://arxiv.org/abs/1204.1651},
	abstract = {Mobile communication touches every aspect of our life, it become one of the major dependencies that the 21st Century civilizations rely on. Thereby, security is a major issue that should be targeted by communication technologies. In this paper we will target authentication and encryption in GSM and 3G/UMTS. In order to understand clearly how things work, we will start by presenting the architecture of each network, its major components, its authentication algorithms, protocols used, and KASUMI Block Cipher.},
	urldate = {2018-09-02},
	journal = {arXiv:1204.1651 [cs]},
	author = {Elouafiq, Ali},
	month = apr,
	year = {2012},
	note = {arXiv: 1204.1651},
	keywords = {3g, Computer Science - Cryptography and Security, Computer Science - Networking and Internet Architecture, gsm, umts}
}
Downloads: 0