Securing Mobile Phone Calls with Identity-Based Cryptography

  • Matthew Smith
  • Christian Schridde
  • Björn Agel
  • Bernd Freisleben
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5576)


In this paper, an identity-based key agreement system and its implementation for mobile telephony in GSM and UMTS networks is presented. The use of telephone numbers as public keys allows the system to piggyback much of the security overhead for key management to the existing GSM or UMTS infrastructure. The proposed approach offers solutions to the problems of multi-domain key generation, key distribution, multi-domain public parameter distribution and inter-domain key agreement. The feasibility of the approach is illustrated by presenting experimental results based on a Symbian implementation running on N95-1 and N82-1 Nokia smartphones.


Mobile System Public Parameter Visitor Location Register Home Location Register Base Transceiver Station 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Horwitz, J., Lynn, B.: Toward Hierarchical Identity-Based Encryption. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 466–481. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  2. 2.
    McCullagh, N., Barreto, P.: A New Two-Party Identity-Based Authenticated Key Agreement. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 262–274. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Boyen, X., Goh, E.-J.: Hierarchical Identity Based Encryption with Constant Size Ciphertext. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 440–456. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  4. 4.
    Diffie, W., Hellman, M.E.: New Directions In Cryptography. IEEE Transactions On Information Theory 6, 644–654 (1976)MathSciNetCrossRefzbMATHGoogle Scholar
  5. 5.
    Rivest, R.L., Shamir, A., Adleman, L.: A Method For Obtaining Digital Signatures And Public-Key Cryptosystems. Communications Of ACM 1(2), 120–126 (1978)MathSciNetCrossRefzbMATHGoogle Scholar
  6. 6.
    Petrovic, S.: An improved Cryptanalysis of the A5/2 Algorithm for Mobile Communications. In: Proceedings of the IASTED International Conference on Communication Systems and Networks, pp. 437–444 (2002)Google Scholar
  7. 7.
    Clavier, C.: An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm. In: McDaniel, P., Gupta, S.K. (eds.) ICISS 2007. LNCS, vol. 4812, pp. 143–155. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  8. 8.
    Meyer, U., Wetzel, S.: A Man-In-The-Middle Attack on UMTS. In: WiSe 2004: Proceedings of the 3rd ACM Workshop on Wireless Security, pp. 90–97. ACM, New York (2004)CrossRefGoogle Scholar
  9. 9.
    Bao, F., Deng, R.H., Zhu, H.: Variations of Diffie-Hellman Problem. In: International Conference on Information and Communications Security, pp. 301–312 (2003)Google Scholar
  10. 10.
    Okamoto, E.: Key Distribution Systems Based on Identification Information. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 194–202. Springer, Heidelberg (1988)Google Scholar
  11. 11.
    Pohlig, S., Hellman, M.: An Improved Algorithm for Computing Logarithms over GF(p) and its Cryptographic Significance, pp. 106–110 (1984)Google Scholar
  12. 12.
    Pollard, J.: Theorems of Factorization and Primality Testing. Mathematical Proceedings of the Cambridge Philosophical Society 76, 521–528 (1974)MathSciNetCrossRefzbMATHGoogle Scholar
  13. 13.
    Schridde, C., Smith, M., Freisleben, B.: An Identity-Based Key Agreement Protocol for the Network Layer. In: Ostrovsky, R., De Prisco, R., Visconti, I. (eds.) SCN 2008. LNCS, vol. 5229, pp. 409–422. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  14. 14.
    Dryburgh, L., Hewett, J.: Signaling System No. 7 (SS7/C7): Protocol, Architecture, and Applications. Cisco Press (2003)Google Scholar
  15. 15.
    Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. SIAM Journal of Computation 32(3), 586–615 (2003)MathSciNetCrossRefzbMATHGoogle Scholar
  16. 16.
    Kumar, K.P., Shailaja, G., Kavitha, A., Saxena, A.: Mutual Authentication and Key Agreement for GSM. In: ICMB 2006: Proceedings of the International Conference on Mobile Business, p. 25. IEEE Computer Society, Washington (2006)CrossRefGoogle Scholar
  17. 17.
  18. 18.

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Matthew Smith
    • 1
  • Christian Schridde
    • 1
  • Björn Agel
    • 1
  • Bernd Freisleben
    • 1
  1. 1.Department of Mathematics and Computer ScienceUniversity of MarburgMarburgGermany

Personalised recommendations