Skip to main content

Enhancement of GSM Stream Cipher Security Using Variable Taps Mechanism and Nonlinear Combination Functions on Linear Feedback Shift Registers

  • Conference paper
  • First Online:
Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 51))

Abstract

With the advance wireless communication, data security became a significant concern. The GSM standard hardware level encryption technique uses A5/1 algorithm circuit which embedded in the Mobile Equipment. A5/1 algorithm uses Linear Feedback Shift Register (LFSR) to produce a key streams for encode the information sent between the mobile station and the base station. It is a secure cipher among all the versions of ciphers using in GSM. However, latest research studies demonstrate that A5/1 can be subjected to several attacks owing to feeble clocking mechanism which results in a low rate of linear complexity. To overcome from these issues, we introduce a feedback tap mechanism enhanced by variable taps and four nonlinear combination functions. Analysis shows that the proposed method has a high algebraic degree of correlation immunity against basic correlation attack, mathematical attack, linear estimate attack and Berlekamp-Massey attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Shrestha, R., Paily, R.: Design and implementation of a linear feedback shift register interleaver for turbo decoding. In: VDAT’12 Proceedings of the 16th International Conference on Progress in VLSI Design and Test, Heidelberg (2012)

    Google Scholar 

  2. Sugimura, T., Shibata, K., Fujita, Y.: A method for deriving tap polynomials of LFSR generating syndromes by utilizing a matrix-reduction algorithm. Electron. Commun. Japan (Part III: Fundamental Electronic Science) 90(1), 30–45 (2007)

    Google Scholar 

  3. Upadhyay, D.P., Sharma, P., Valiveti, S.: Randomness analysis of A5/1 stream cipher for secure mobile communication. Int. J. Comput. Sci. Commun. 3, 95–100 (2014)

    Google Scholar 

  4. Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5/1 on a PC. In: Advances in Cryptology, Proceedings of Fast Software Encryption’00, LNCS, pp. 1–18. Springer-Verlag (2001)  

    Google Scholar 

  5. Biham, E., Dunkelman, O.: Cryptanalysis of the A5/1 GSM stream cipher. In: Progress in Cryptology, Proceedings of INDOCRYPT’00, LNCS, pp. 43–51. Springer-Verlag (2000)

    Google Scholar 

  6. Johanson, T., Ekdahl, P.: Another attack on A5/1. IEEE Trans. Inf. Theory 49, 284–289 (2003)

    Google Scholar 

  7. Maximov, A., Johansson, T., Babbage, S.: An improved correlation attack on A5/1. In Proceedings of SAC 2004, LNCS, vol. 3357, pp. 1–18. Springer-Verlag (2005)

    Google Scholar 

  8. Barkan, E., Biham, E.: Conditional estimators: an effective attack on A5/1. In: Proceedings of SAC 2005, LNCS, vol. 3897, pp. 1–19. Springer-Verlag (2006)

    Google Scholar 

  9. Yamada, T., Nakajima, H.: Pseudorandom pattern built-in self-test for embedded rams. Syst. Comput. Japan 7(12), 1–8 (2012)

    Google Scholar 

  10. Upadhyay, D.P., Shah, A., Sharma, P.R.: In: IEEE International Conference on Computational Intelligence and Communication Networks, Udaipur (2014)

    Google Scholar 

  11. Ahmad, M, Izharuddin.: Randomness evaluation of stream cipher for secure mobile communication. In: IEEE International Conference on Network Security (2010)

    Google Scholar 

  12. Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Lecture Notes in Computer Science, vol. 2656, pp. 345–359. Springer, Berlin (2003)

    Google Scholar 

  13. Ahmad, M, Izharuddin.: Enhanced A5/1 cipher with improved linear complexity. In: IEEE International Conference on Impact (2009)

    Google Scholar 

  14. Feregrino-Uribe, C., Kitsos, P., Cumplido, R., Morales-Sandoval, M.: Area/performance trade-off analysis of an FPGA digit-serial GF(2 m) Montgomery multiplier based on LFSR. Comput. Electr. Eng. 39, 542–549 (2013)

    Google Scholar 

  15. Karpovsky, M., Wang, Z.: Design of strongly secure communication and computation channels by nonlinear error detecting codes. IEEE Trans. Comput. 63(11), 2716–2728 (2014)

    Google Scholar 

  16. Hawkes, P., Rose, G.G.: The complexity of fast algebraic attacks on stream ciphers. In: Lecture Notes in Computer Science, Advances in Cryptology—CRYPTO2004, pp. 390–406. Springer, Berlin (2004)

    Google Scholar 

  17. Konheim, A.G.: Computer Security and Cryptography, p. 544. Wiley, California (2007)

    Book  Google Scholar 

  18. Shah, T., Upadhyay, D.P., Sharma, P.: A comparative analysis of different LFSR based ciphers and parallel computing platforms for development of generic cipher compatible on both hardware and software platforms, Jaipur (2014)

    Google Scholar 

Download references

Acknowledgment

The authors would like to thank Nirma University and Dalhousie University for providing common platform for research collaboration. This work has been funded by Shastri research Grant—Canada. The authors would also like to thank program and member relations officer, Shastri Indo Canadian Institute for support and guidance related to project grant.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Darshana Upadhyay .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Upadhyay, D., Sharma, P., Sampalli, S. (2016). Enhancement of GSM Stream Cipher Security Using Variable Taps Mechanism and Nonlinear Combination Functions on Linear Feedback Shift Registers. In: Satapathy, S., Das, S. (eds) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2. Smart Innovation, Systems and Technologies, vol 51. Springer, Cham. https://doi.org/10.1007/978-3-319-30927-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-30927-9_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-30926-2

  • Online ISBN: 978-3-319-30927-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics