
 
signaling information. The purpose of this function 
is to avoid an intruder to identify a subscriber on the 
radio path by listening to the signaling exchanges. 
This function can be achieved by protecting the 
subscriber’s IMSI and any signaling information 
elements. Therefore, a protected identifying method 
should be used to identify a mobile subscriber 
instead of the IMSI on the radio path. The signaling 
information elements that convey information about 
the mobile subscriber identity must be transmitted in 
ciphered form (Chengyuan Peng, 2003). 
The GSM system uses symmetric cryptography - 
the data is encrypted and decrypted using the same 
ciphering key – the Kc. The idea is that the Kc 
should only be known by the phone and the network. 
If this is the case, the data is meaningless to anyone 
intercepting it. The Kc should also frequently 
change, in case it is eventually compromised (J. 
Quirke, 2004). Whenever the A3 algorithm is run (to 
generate SRES), the A8 algorithm is run as well. 
The A8 algorithm uses the RAND and K
i
 as input to 
generate a 64-bit ciphering key, the Kc, which is 
then stored in the SIM and is readable by the phone. 
The network also generates the Kc and distributes it 
to the Base Station handling the connection.  
At any time, the network can then order the 
phone to start ciphering the data (once authenticated) 
using the Kc generated. The network can pick from 
a number of algorithms to use, as long as the phone 
supports the one chosen. It can choose from up to 7 
different ciphering algorithms (or no ciphering), 
however it must choose an algorithm the phone 
indicates it supports. Currently there are 3 
algorithms defined – A5/1, A5/2 and A5/3. It should 
be noted that A5/0 (no encryption) is available for 
use in countries where there may be political 
obstacles in supplying cryptographic hardware, such 
as Middle Eastern or certain former Soviet countries.  
This allows roaming to continue to work, and also 
offers these countries the ability to use modern GSM 
handsets (Bruce Potter, May 2004). 
3  EVALUATION OF THE 
EXISISTING SECURITY 
MEASURES 
There are still some potential threats posed in the 
GSM system although of these security measures 
(GSM 02.09)(R. Campbell & D. Mckunas, 2003)( 
Yong LI, Yin CHEN& T. MA, 2002)(L. Ertaul and 
B. Kasim, June 2005) summarized as follows: 
•  Limited encryption scope (Encryption 
terminated at the base station) 
•  Insecure key transmission (Cipher keys and 
authentication parameters are transmitted in 
clear between and within networks). 
•  Security through Obscurity- Authentication and 
encryption algorithms were never made public. 
The whole security model developed in secret 
which rises suspicion that cryptographic 
algorithms are weak. Although never published, 
ciphering algorithm A5 has been reverse 
engineered by authors in (A. Biryukov and A. 
Shamir, 2000). Authentication algorithms are 
also reversed engineered (J. Rao, P. Rohatgi, H. 
Scherzer and S. Tinguely, 2002).  
•  End to end security is not provided. 
•  If track of TMSI is lost then the mobile needs to 
transmit the IMSI, this can be done by the false 
base station. 
•  Using the knowledge of IMSI and using 
repeated authentication requests, the Ki can be 
broken. 
•  Network does not authenticate itself to the 
phone, making it possible for an attacker to set 
up false base station. 
•  Ciphering is optional and is turned on by the 
base station. 
•  It is believed that GSM is secure for average 
users. However it is not secure for high security 
transmission. 
4  ACTION-TRIGGERED  
PUBLIC-KEY SECURITY 
SYSTEM (ATPKSS) 
In our proposed integration system, public key 
technique is the main factor. Public-key algorithms 
are based on number theory. It is asymmetric, 
involving the use of two separate keys, in contrast to 
the symmetric conventional encryption, which uses 
only one key (RSA Labs). Each one of the 
communicating parties has a pair of keys, “Public 
Key” and “Private Key”. Those keys are used in both 
Encryption and Authentication (digital signature) 
(William Stallings)(Limor Elbaz, 2002). 
In this section we will emphasize on some of the 
above problems and highlight the solutions in our 
proposed system. Of course, using Public-key 
technique in mobile communication is not un-
explored before but it was not used due to its high 
computations that cause a delay. But our solutions 
based on an Action Triggered mode, meaning, if a 
ACTION-TRIGGERED PUBLIC-KEY SYSTEM FOR GSM USING RSA WITH PHONE-DEPENDENT ENCRYPTION
177