Implementation of Enhanced A5/1 Stream Cipher and its Randomness Analysis by NIST Test Suite

被引:2
|
作者
Prajapat, Ram Prakash [1 ]
Bhadada, Rajesh [2 ]
Sharma, Giriraj [3 ]
机构
[1] BSNL, SDE, Jodhpur 342001, Rajasthan, India
[2] MBM Engn Coll, Jodhpur, Rajasthan, India
[3] BSNL, SDE, Kota 324002, India
关键词
GSM; Encryption; Stream Cipher; A5/1; Linear Complexity (LC); LFSR; NIST Test Suite; ATTACK;
D O I
10.1109/iSES52644.2021.00102
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Global System for Mobile (GSM) is still widely used cellular standard providing many services like Voice, SMS & Data Service with mobility. To secure information in the GSM cellular network, security is implemented at two levels i.e. initially to authorize the valid users for every location update and then during call, encryption is applied over the information being transmitted on GSM channel to protect from being intercepted and decoded by unauthorized persons. This protection is achieved by converting the original message into an encoded form (cipher form) that appears to be a random stream of symbols. Under "Challenge-Response" mechanism, A3 and A8 algorithms are used to generate triplet (RAND, SRES & K-c) for authentication of any user at GSM network. But the actual information is encrypted using A5 algorithm to generate cipher stream for better protection from interception. This A5 stream cipher has three versions: A5/1, A5/2 and A5/3. A5/1 works on Liner Feedback Shift Registers (LFSRs) with irregular clocking and generates pseudo random binary stream. These three versions of A5 algorithm are being used for encryption of information over GSM since the launching of GSM services and have been cryptographically analyzed by Reverse-Engineering. With passage of time, many hackers & crackers are becoming able to break this encryption identifying some weaknesses of these algorithms and can decrypt the original information. These stream ciphers are facing some weaknesses like poor Liner Complexity (LC) & clocking mechanism (Majority Rule), short clocking period, weak choice of clocking taps and collision problem. Because of such weaknesses, these stream ciphers can be decrypted by intruders. In this papers an attempt has been made to reduce these weaknesses and enhance the security by introducing non-linear combinational generator (NLFSRs), reuse of 32 bits SRES generated by A3 algorithm and finally combining the output stream with last 32 bits of CGI. The randomness analysis of proposed stream cipher is carried out by NIST Statistical Test Suite and it is confirmed by comparison of the randomness parameters results that the randomness of bit-stream produced by the proposed stream cipher has improved significantly hence the enhanced security can be achieved.
引用
收藏
页码:426 / 431
页数:6
相关论文
共 10 条
  • [1] QCA Implementation of A5/1 Stream Cipher
    Amiri, Mohammad Amin
    Mahdavi, Mojdeh
    Mirzakuchaki, Sattar
    2009 SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN CIRCUITS, ELECTRONICS AND MICRO-ELECTRONICS, 2009, : 48 - +
  • [2] Simulink Based Implementation of Developed A5/1 Stream Cipher Cryptosystems
    Sadkhan, Sattar B.
    Jawad, Nibras Hadi
    INTERNATIONAL CONFERENCE ON COMMUNICATIONS, MANAGEMENT, AND INFORMATION TECHNOLOGY (ICCMIT'2015), 2015, 65 : 350 - 357
  • [3] On-chip Lightweight Implementation of Reduced NIST Randomness Test Suite
    Suresh, Vikram B.
    Antonioli, Daniele
    Burleson, Wayne P.
    2013 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE-ORIENTED SECURITY AND TRUST (HOST), 2013, : 93 - 98
  • [4] Side-Channel Attack on the A5/1 Stream Cipher
    Jurecek, Martin
    Bucek, Jiri
    Lorencz, Robert
    2019 22ND EUROMICRO CONFERENCE ON DIGITAL SYSTEM DESIGN (DSD), 2019, : 633 - 638
  • [5] Enhanced A5/1 Cipher with Improved Linear Complexity
    Ahmad, Musheer
    Izharuddin
    2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA, SIGNAL PROCESSING AND COMMUNICATION TECHNOLOGIES, 2009, : 265 - 267
  • [6] Modified A5/1 Based Stream Cipher For Secured GSM Communication
    Zakaria, Nur Hafiza
    Seman, Kamaruzzaman
    Abdullah, Ismail
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (02): : 223 - 226
  • [7] Reduction of the key space of the cipher A5/1 and invertibility of the next-state function for a stream generator
    Kiselev S.A.
    Tokareva N.N.
    Journal of Applied and Industrial Mathematics, 2012, 6 (2) : 194 - 202
  • [8] Design, Implementation and Analysis of GSM stream cipher : Software simulators vs real test bed - FPGA
    Upadhyay, Darshana
    Shah, Ankit
    Sharma, Priyanka
    2014 6TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS, 2014, : 930 - 934
  • [9] Design Analysis of an n-Bit LFSR-Based Generic Stream Cipher and Its Implementation Discussion on Hardware and Software Platforms
    Shah, Trishla
    Upadhyay, Darshana
    PROCEEDINGS OF THE INTERNATIONAL CONGRESS ON INFORMATION AND COMMUNICATION TECHNOLOGY, ICICT 2015, VOL 2, 2016, 439 : 607 - 621
  • [10] Molecular test for BRCA 1 and 2: Hereditary breast and ovarian cancer syndrome. Analysis of cost effectiveness of its implementation
    Paez, Maria C.
    Riggi, Maria C.
    Gogorza, Sebastian J.
    Petracchi, Florencia
    CANCER RESEARCH, 2018, 78 (04)