The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information Security over mobile communication networks is important for secure communication. In GSM mobile standard, A5/1 stream cipher is used to provide security over-the-air voice transmissions. It is strong encryption algorithm among the cryptographic algorithms used in GSM. However, it is cryptanalized by a number of attacks. Recent studies show that it has serious security weaknesses in its...
Global system for mobile communication (GSM) uses A5/1 stream cipher to encrypt the information transmitted between subscribers mobile and the base station. Recent research studies show that A5/1 cipher has some limitations, due to which it is susceptible to various cryptographic attacks. It has weak clocking mechanism and output bit sequence of A5/1 has low value of linear complexity. In this paper,...
In the past decade, a number of image encryption algorithms based on chaotic maps have been proposed. Recently, an image encryption algorithm based on chaotic map lattice (CML) is proposed that allows direct encryption and decryption of color digital images. In this paper, we propose an enhanced CML based algorithm for image encryption to improve the security of the algorithm. The performance of the...
GSM is widely used cellular standard in the world. GSM uses A5/x algorithms to secure the information sent over the air interface. A5/1 is a strong encryption algorithm among all A5/x algorithms. However, recent studies show that it has security flaws in its architecture, owing to which it is susceptible to several cryptographic attacks. This paper presents an enhanced scheme of A5/1 algorithm to...
Hash based security systems using a one way hash function are widely used in the network security. Design of such system revolves around the selection of proper function. An ideal hash function is the one that will never cause a collision. Although separate chaining and other techniques can be successfully applied for collision resolution, it is still a challenging job to find a suitable hash function...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.