GSM Security And Encryption (download seminars report)
#12
presented by:
Gregory Greenman

[attachment=10702]
LFSR structure
Purpose - to produce pseudo random bit sequence
Consists of two parts :
 shift register – bit sequence
 feedback function
Tap Sequence :
 bits that are input to the feedback function
LFSR Features
LFSR Period – the length of the output sequence before it starts repeating itself.
n-bit LFSR can be in 2n-1 internal states è the maximal period is also 2n-1
the tap sequence determines the period
the polynomial formed by a tap sequence plus 1 must be a primitive polynomial (mod 2)
A5/1 Overview
A5/1 is a stream cipher, which is initialized all over again for every frame sent.
Consists of 3 LFSRs of 19,22,23 bits length.
The 3 registers are clocked in a stop/go fashion using the majority rule.
A5/1 : Operation
All 3 registers are zeroed
64 cycles (without the stop/go clock) :
 Each bit of K (lsb to msb) is XOR'ed in parallel into the lsb's of the registers
22 cycles (without the stop/go clock) :
 Each bit of Fn (lsb to msb) is XOR'ed in parallel into the lsb's of the registers
100 cycles with the stop/go clock control, discarding the output
 228 cycles with the stop/go clock control which produce the output bit sequen
The Model
The internal state of A5/1 generator is the state of all 64 bits in the 3 registers, so there are 264-1 states.
The operation of A5/1 can be viewed as a state transition :
Standard attack assumes the knowledge of about 64 output bits (64 bits →264 different sequences).
Space/Time Trade-Off Attack I
Get keystream bits k1,k2,…,kM+n and prepare M subsequences :
Select R random states S1,..,SR and for each state generate an n-bit keystream
Shamir/Biryukov Attack Outline
2 disks (73 GB) and 2 first minutes of the conversation are needed. Can find the key in less than a second.
This attack based on the second variation of the space/time tradeoff.
There are n = 264 total states
A – the set of prepared states (and relevant prefixes)
B – the set of states through which the algo. proceeds
The main idea :
 Find state s in A∩ B (the states are identified by prefix)
 Run the algorithm in the reverse direction
Biased Birthday Attack
Birthday paradox : A ∩ B ≠ o if |A| ∙ |B| ≈ n
Each state is chosen for A with probability PA(s) and for B with probability PB(s). Then, the intersection will not be empty if Σs PA(s) ∙ PB(s) ≈ 1
The idea is to choose the states from A and B with 2 non-uniform distributions that have correlation between them
Special States
Disk access is very time-consuming!
Keep on disk (set A) only those states, which produce a sequence that starts with a certain pattern α, | α| = k
Access the disk only when α is encountered
2k prefixes can start with α, so we reduce the number of total possible states (n) by 2k and the number of disk access times by 2k. The size of A, however, is unchanged, and we only insert the states that satisfy the condition there. Thus, we don't miss intersections.
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: emmanuel candes, gsm ppt for seminar, seminar gsm security and encryption, gsm training report, gsm security enhancer, application of gsm security and encryption, rpe ltp coder,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Messages In This Thread
RE: GSM Security - by seminar class - 22-03-2011, 09:56 AM

Possibly Related Threads...
Thread Author Replies Views Last Post
  network security seminars report computer science technology 14 21,053 24-11-2018, 01:19 AM
Last Post:
  OBJECT TRACKING AND DETECTION full report project topics 9 31,824 06-10-2018, 12:20 PM
Last Post: jntuworldforum
  Optical Computer Full Seminar Report Download computer science crazy 46 68,077 29-04-2016, 09:16 AM
Last Post: dhanabhagya
  Data Encryption Standard (DES) seminar class 2 9,421 20-02-2016, 01:59 PM
Last Post: seminar report asees
  Digital Signature Full Seminar Report Download computer science crazy 20 45,388 16-09-2015, 02:51 PM
Last Post: seminar report asees
  Steganography In Images (Download Seminar Report) Computer Science Clay 16 26,379 08-06-2015, 03:26 PM
Last Post: seminar report asees
  Mobile Train Radio Communication ( Download Full Seminar Report ) computer science crazy 10 28,437 01-05-2015, 03:36 PM
Last Post: seminar report asees
Heart wireless intelligent network(win) (Download Full Report And Abstract) computer science crazy 7 15,753 10-02-2015, 05:52 PM
Last Post: seminar report asees
  Image Processing & Compression Techniques (Download Full Seminar Report) Computer Science Clay 42 23,303 07-10-2014, 07:57 PM
Last Post: seminar report asees
  IRIS SCANNING Full Seminar Report download Computer Science Clay 27 25,594 17-08-2014, 05:49 PM
Last Post: ewpltnbbq

Forum Jump: