2734-Article Text-2709-1-10-20180901
2734-Article Text-2709-1-10-20180901
Volume: 1 Issue: 1 53 – 54
___________________________________________________________________________
Abstract— the security mechanisms of GSM are implemented in three different system elements; the Subscriber
Identity Module (SIM), the GSM handset or MS, and the GSM network. The SIM contains the IMSI, the individual
subscriber authentication key (Ki), the ciphering key generating algorithm (A8), the authentication algorithm (A3), as
well as a Personal Identification Number (PIN). The GSM handset contains the ciphering algorithm (A5). The
encryption algorithms (A3, A5, and A8) are present in the GSM network as well. The Authentication Center (AUC),
part of the Operation and Maintenance Subsystem (OMS) of the GSM network, consists of a database of
identification and authentication information for subscribers. This information consists of the IMSI, the TMSI, the
Location Area Identity (LAI), and the individual subscriber authentication key (Ki) for each user. In order for the
authentication and security mechanisms to function, all three elements (SIM, handset, and GSM network) are
required. This distribution of security credentials and encryption algorithms provides an additional measure of
security both in ensuring the privacy of cellular telephone conversations and in the prevention of cellular telephone
fraud [4].
_____________________________________________________*****______________________________________________________
Volume: 1 Issue: 1 53 – 54
___________________________________________________________________________