Abstract
With the advance wireless communication, data security became a significant concern. The GSM standard hardware level encryption technique uses A5/1 algorithm circuit which embedded in the Mobile Equipment. A5/1 algorithm uses Linear Feedback Shift Register (LFSR) to produce a key streams for encode the information sent between the mobile station and the base station. It is a secure cipher among all the versions of ciphers using in GSM. However, latest research studies demonstrate that A5/1 can be subjected to several attacks owing to feeble clocking mechanism which results in a low rate of linear complexity. To overcome from these issues, we introduce a feedback tap mechanism enhanced by variable taps and four nonlinear combination functions. Analysis shows that the proposed method has a high algebraic degree of correlation immunity against basic correlation attack, mathematical attack, linear estimate attack and Berlekamp-Massey attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Shrestha, R., Paily, R.: Design and implementation of a linear feedback shift register interleaver for turbo decoding. In: VDAT’12 Proceedings of the 16th International Conference on Progress in VLSI Design and Test, Heidelberg (2012)
Sugimura, T., Shibata, K., Fujita, Y.: A method for deriving tap polynomials of LFSR generating syndromes by utilizing a matrix-reduction algorithm. Electron. Commun. Japan (Part III: Fundamental Electronic Science) 90(1), 30–45 (2007)
Upadhyay, D.P., Sharma, P., Valiveti, S.: Randomness analysis of A5/1 stream cipher for secure mobile communication. Int. J. Comput. Sci. Commun. 3, 95–100 (2014)
Biryukov, A., Shamir, A., Wagner, D.: Real time cryptanalysis of A5/1 on a PC. In: Advances in Cryptology, Proceedings of Fast Software Encryption’00, LNCS, pp. 1–18. Springer-Verlag (2001) Â
Biham, E., Dunkelman, O.: Cryptanalysis of the A5/1 GSM stream cipher. In: Progress in Cryptology, Proceedings of INDOCRYPT’00, LNCS, pp. 43–51. Springer-Verlag (2000)
Johanson, T., Ekdahl, P.: Another attack on A5/1. IEEE Trans. Inf. Theory 49, 284–289 (2003)
Maximov, A., Johansson, T., Babbage, S.: An improved correlation attack on A5/1. In Proceedings of SAC 2004, LNCS, vol. 3357, pp. 1–18. Springer-Verlag (2005)
Barkan, E., Biham, E.: Conditional estimators: an effective attack on A5/1. In: Proceedings of SAC 2005, LNCS, vol. 3897, pp. 1–19. Springer-Verlag (2006)
Yamada, T., Nakajima, H.: Pseudorandom pattern built-in self-test for embedded rams. Syst. Comput. Japan 7(12), 1–8 (2012)
Upadhyay, D.P., Shah, A., Sharma, P.R.: In: IEEE International Conference on Computational Intelligence and Communication Networks, Udaipur (2014)
Ahmad, M, Izharuddin.: Randomness evaluation of stream cipher for secure mobile communication. In: IEEE International Conference on Network Security (2010)
Courtois, N.T., Meier, W.: Algebraic attacks on stream ciphers with linear feedback. In: Lecture Notes in Computer Science, vol. 2656, pp. 345–359. Springer, Berlin (2003)
Ahmad, M, Izharuddin.: Enhanced A5/1 cipher with improved linear complexity. In: IEEE International Conference on Impact (2009)
Feregrino-Uribe, C., Kitsos, P., Cumplido, R., Morales-Sandoval, M.: Area/performance trade-off analysis of an FPGA digit-serial GF(2 m) Montgomery multiplier based on LFSR. Comput. Electr. Eng. 39, 542–549 (2013)
Karpovsky, M., Wang, Z.: Design of strongly secure communication and computation channels by nonlinear error detecting codes. IEEE Trans. Comput. 63(11), 2716–2728 (2014)
Hawkes, P., Rose, G.G.: The complexity of fast algebraic attacks on stream ciphers. In: Lecture Notes in Computer Science, Advances in Cryptology—CRYPTO2004, pp. 390–406. Springer, Berlin (2004)
Konheim, A.G.: Computer Security and Cryptography, p. 544. Wiley, California (2007)
Shah, T., Upadhyay, D.P., Sharma, P.: A comparative analysis of different LFSR based ciphers and parallel computing platforms for development of generic cipher compatible on both hardware and software platforms, Jaipur (2014)
Acknowledgment
The authors would like to thank Nirma University and Dalhousie University for providing common platform for research collaboration. This work has been funded by Shastri research Grant—Canada. The authors would also like to thank program and member relations officer, Shastri Indo Canadian Institute for support and guidance related to project grant.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Upadhyay, D., Sharma, P., Sampalli, S. (2016). Enhancement of GSM Stream Cipher Security Using Variable Taps Mechanism and Nonlinear Combination Functions on Linear Feedback Shift Registers. In: Satapathy, S., Das, S. (eds) Proceedings of First International Conference on Information and Communication Technology for Intelligent Systems: Volume 2. Smart Innovation, Systems and Technologies, vol 51. Springer, Cham. https://doi.org/10.1007/978-3-319-30927-9_18
Download citation
DOI: https://doi.org/10.1007/978-3-319-30927-9_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-30926-2
Online ISBN: 978-3-319-30927-9
eBook Packages: EngineeringEngineering (R0)