Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2nd IEE Secure Mobile Communications Forum: Exploring the Technical Challenges in Secure GSM and WLAN 2004
DOI: 10.1049/ic.2004.0663
|View full text |Cite
|
Sign up to set email alerts
|

Real time data transmission over GSM voice channel for secure voice & data applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(8 citation statements)
references
References 0 publications
0
8
0
Order By: Relevance
“…The strongest of these algorithms is A5/1 which was developed and applied in the United States and Europe; while the weakest algorithm is A5/2 which is used in other countries. A ciphertext-only attack is able to break A5/2, in addition, the rainbow table attack could crack A5/1 [11].…”
Section: Gsm Voice Call Securitymentioning
confidence: 99%
“…The strongest of these algorithms is A5/1 which was developed and applied in the United States and Europe; while the weakest algorithm is A5/2 which is used in other countries. A ciphertext-only attack is able to break A5/2, in addition, the rainbow table attack could crack A5/1 [11].…”
Section: Gsm Voice Call Securitymentioning
confidence: 99%
“…Using voice channels for data communication is an existing concept, e.g., [16][17][18][19][20]. These works primarily focus on how to improve the communication performance while compatibly working with the voice codec in GSM systems.…”
Section: Related Workmentioning
confidence: 99%
“…The Global System for Mobile (GSM) technologies is mainly used for voice communications in many countries, even for military purposes. However, while they ensure confidentiality for the radio access channel, its security is not guaranteed when speech is transmitted across the switch network using standard modulation such as pulse-code modulation (PCM) and adaptive differential pulse-code modulation (ADPCM) forms [1]. To ensure the end-to-end confidentiality, the speech signals are encrypted before entering the communication systems.…”
Section: Introductionmentioning
confidence: 99%