signaling information. The purpose of this function
is to avoid an intruder to identify a subscriber on the
radio path by listening to the signaling exchanges.
This function can be achieved by protecting the
subscriber’s IMSI and any signaling information
elements. Therefore, a protected identifying method
should be used to identify a mobile subscriber
instead of the IMSI on the radio path. The signaling
information elements that convey information about
the mobile subscriber identity must be transmitted in
ciphered form (Chengyuan Peng, 2003).
The GSM system uses symmetric cryptography -
the data is encrypted and decrypted using the same
ciphering key – the Kc. The idea is that the Kc
should only be known by the phone and the network.
If this is the case, the data is meaningless to anyone
intercepting it. The Kc should also frequently
change, in case it is eventually compromised (J.
Quirke, 2004). Whenever the A3 algorithm is run (to
generate SRES), the A8 algorithm is run as well.
The A8 algorithm uses the RAND and K
i
as input to
generate a 64-bit ciphering key, the Kc, which is
then stored in the SIM and is readable by the phone.
The network also generates the Kc and distributes it
to the Base Station handling the connection.
At any time, the network can then order the
phone to start ciphering the data (once authenticated)
using the Kc generated. The network can pick from
a number of algorithms to use, as long as the phone
supports the one chosen. It can choose from up to 7
different ciphering algorithms (or no ciphering),
however it must choose an algorithm the phone
indicates it supports. Currently there are 3
algorithms defined – A5/1, A5/2 and A5/3. It should
be noted that A5/0 (no encryption) is available for
use in countries where there may be political
obstacles in supplying cryptographic hardware, such
as Middle Eastern or certain former Soviet countries.
This allows roaming to continue to work, and also
offers these countries the ability to use modern GSM
handsets (Bruce Potter, May 2004).
3 EVALUATION OF THE
EXISISTING SECURITY
MEASURES
There are still some potential threats posed in the
GSM system although of these security measures
(GSM 02.09)(R. Campbell & D. Mckunas, 2003)(
Yong LI, Yin CHEN& T. MA, 2002)(L. Ertaul and
B. Kasim, June 2005) summarized as follows:
• Limited encryption scope (Encryption
terminated at the base station)
• Insecure key transmission (Cipher keys and
authentication parameters are transmitted in
clear between and within networks).
• Security through Obscurity- Authentication and
encryption algorithms were never made public.
The whole security model developed in secret
which rises suspicion that cryptographic
algorithms are weak. Although never published,
ciphering algorithm A5 has been reverse
engineered by authors in (A. Biryukov and A.
Shamir, 2000). Authentication algorithms are
also reversed engineered (J. Rao, P. Rohatgi, H.
Scherzer and S. Tinguely, 2002).
• End to end security is not provided.
• If track of TMSI is lost then the mobile needs to
transmit the IMSI, this can be done by the false
base station.
• Using the knowledge of IMSI and using
repeated authentication requests, the Ki can be
broken.
• Network does not authenticate itself to the
phone, making it possible for an attacker to set
up false base station.
• Ciphering is optional and is turned on by the
base station.
• It is believed that GSM is secure for average
users. However it is not secure for high security
transmission.
4 ACTION-TRIGGERED
PUBLIC-KEY SECURITY
SYSTEM (ATPKSS)
In our proposed integration system, public key
technique is the main factor. Public-key algorithms
are based on number theory. It is asymmetric,
involving the use of two separate keys, in contrast to
the symmetric conventional encryption, which uses
only one key (RSA Labs). Each one of the
communicating parties has a pair of keys, “Public
Key” and “Private Key”. Those keys are used in both
Encryption and Authentication (digital signature)
(William Stallings)(Limor Elbaz, 2002).
In this section we will emphasize on some of the
above problems and highlight the solutions in our
proposed system. Of course, using Public-key
technique in mobile communication is not un-
explored before but it was not used due to its high
computations that cause a delay. But our solutions
based on an Action Triggered mode, meaning, if a
ACTION-TRIGGERED PUBLIC-KEY SYSTEM FOR GSM USING RSA WITH PHONE-DEPENDENT ENCRYPTION
177