Skip to main content

GSM: Security, Services, and the SIM

  • Chapter
  • First Online:
State of the Art in Applied Cryptography

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1528))

Abstract

Security requirements and services of a mobile communication system differ, due to the radio communication between the user and the base station, extensively from those of a fixed network. There is no physical link in the form of a (fixed) telephone line between the user and the local exchange, which could serve to “identify” the user for routing and charging purposes. Authentication by means of cryptographic procedures is thus required to stop impostors from taking on the identity of somebody else and “transferring” calls and charges. Eavesdropping on the radio path, intercepting data or tracing the whereabouts of a user by listening to signalling data are other serious threats. This paper discusses countermeasures designed into the Global System for Mobile communications, the rÔle of the Subscriber Identity Module as a security device and security aspects related to the management of the secret authentication keys.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ANSI X3.92: 1981, Data Encryption Algorithm. American National Standards Institute.

    Google Scholar 

  2. C. Brookson, GSM Security: A Description of the Services, in F. Hillebrand (ed.): GSM, Digital Cellular Mobile Communications Seminar, Budapest, 1990, 4.5-1–4.5-5.

    Google Scholar 

  3. ETS 300 175-7, Digital Enhanced Cordless Telecommunications (DECT); Common Interface (CI); Part 7: Security features, 1996 (2nd edition).

    Google Scholar 

  4. ETS 300 331, Digital European Cordless Telecommunications (DECT); DECT Authentication Module, 1995.

    Google Scholar 

  5. GSM 01.02 (ETR 099), Digital cellular telecommunications system (Phase 2); General description of a GSM Public Land Mobile Network (PLMN).

    Google Scholar 

  6. GSM 01.04 (ETR 100), Digital cellular telecommunications system (Phase 2); Abbreviations and acronyms.

    Google Scholar 

  7. GSM 02.09 (ETS 300 506), Digital cellular telecommunications system (Phase 2); Security aspects.

    Google Scholar 

  8. GSM 02.17 (ETS 300 509), Digital cellular telecommunications system (Phase 2); Subscriber Identity Modules (SIM), Functional characteristics.

    Google Scholar 

  9. GSM 03.20 (ETS 300 534), Digital cellular telecommunications system (Phase 2); Security related network functions.

    Google Scholar 

  10. GSM 11.11 (ETS 300 608), Digital cellular telecommunications system (Phase 2); Specification of the Subscriber Identity Module-Mobile Equipment (SIMME) interface.

    Google Scholar 

  11. GSM 11.11 (ETS 300 977), Digital cellular telecommunications system (Phase 2+); Specification of the Subscriber Identity Module-Mobile Equipment (SIMME) interface.

    Google Scholar 

  12. GSM 11.14, Digital cellular telecommunications system (Phase 2+); Specification of the SIM Application Toolkit for the Subscriber Identity Module-Mobile Equipment (SIM-ME) interface.

    Google Scholar 

  13. GSM 12.03 (ETS 300 614), Digital cellular telecommunications system (Phase 2); Security management.

    Google Scholar 

  14. ISO/IEC 7816, Identification cards-Integrated circuit(s) cards with contacts. Part 1: 1987, Physical characteristics. Part 2: 1988, Dimensions and location of the contacts. Part 3: 1989, Electronic signals and transmission protocols.

    Google Scholar 

  15. ISO/IEC 9797: 1994 (2nd edition), Information technology-Security techniques-Data integrity mechanism using a cryptographic check function employing a block cipher algorithm.

    Google Scholar 

  16. ISO/IEC 10116: 1997 (2nd edition), Information technology-Security techniques-Modes of operation for an n-bit block cipher algorithm.

    Google Scholar 

  17. M. Mouly and M.-B. Pautet, The GSM system for mobile communications, ISBN 2-9507190-0-7, Palaiseau, 1992.

    Google Scholar 

  18. K. Vedder and F. Weikmann, Smart Cards, this volume, pp. 311–336.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 1998 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Vedder, K. (1998). GSM: Security, Services, and the SIM. In: State of the Art in Applied Cryptography. Lecture Notes in Computer Science, vol 1528. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49248-8_10

Download citation

  • DOI: https://doi.org/10.1007/3-540-49248-8_10

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-65474-2

  • Online ISBN: 978-3-540-49248-1

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics