CFP last date
20 May 2024
Reseach Article

Enhancement in Feedback Polynomials of LFSR used in A5/1 Stream Cipher

by Rosepreet Kaur, Nikesh Baja
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 57 - Number 19
Year of Publication: 2012
Authors: Rosepreet Kaur, Nikesh Baja
10.5120/9224-3783

Rosepreet Kaur, Nikesh Baja . Enhancement in Feedback Polynomials of LFSR used in A5/1 Stream Cipher. International Journal of Computer Applications. 57, 19 ( November 2012), 32-35. DOI=10.5120/9224-3783

@article{ 10.5120/9224-3783,
author = { Rosepreet Kaur, Nikesh Baja },
title = { Enhancement in Feedback Polynomials of LFSR used in A5/1 Stream Cipher },
journal = { International Journal of Computer Applications },
issue_date = { November 2012 },
volume = { 57 },
number = { 19 },
month = { November },
year = { 2012 },
issn = { 0975-8887 },
pages = { 32-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume57/number19/9224-3783/ },
doi = { 10.5120/9224-3783 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:00:55.487202+05:30
%A Rosepreet Kaur
%A Nikesh Baja
%T Enhancement in Feedback Polynomials of LFSR used in A5/1 Stream Cipher
%J International Journal of Computer Applications
%@ 0975-8887
%V 57
%N 19
%P 32-35
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

There is encryption algorithms used in GSM. This is for to encrypt the information when transmit from mobile station to base station during communication. As stated that A5/1 is strong algorithm but it cryptanalysis by cryptanalysts. This paper modified concept to improve A5/1 encryption algorithm by consideration of feedback combining function of LFSRs (Linear feedback shift register) use in A5/1 and modified version of A5/1 is fast and easy to implement. This is proved by the comparison of existing A5/1 and modified A5/1 with novel key stream generator using pseudorandom binary sequence. Basic security of A5/1 analysis by statistical tests given by national institute of standards and technology (NIST) in order to ensure the quality of bit stream produced by the generator.

References
  1. Mobile networks security,tklmarkuspeuhkuri ,2008-04-22
  2. http://csrc. nist. gov/groups/ST/toolkit/rng/documentation_software. html.
  3. Communication security in gsm networks petrbouška, martin drahanskýfaculty of information technology, brno university of technology
  4. A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, and Adi Shamir.
  5. Instant cipher text-only cryptanalysis of GSM encrypted communication, EladBarkan, Eli.
  6. On LFSR based stream cipher ,analysis and design , PatrikEkdahl.
  7. GSM Security and Encryption by David Margrave, George Mason University.
  8. Stream Ciphers for GSM Networks,Chi-Chun La and Yu-Jen Chen Institute of Information Management,NationalChiao-Tung University.
  9. Mi-Og Park, Yeon-Hee Choi, Moon-Seog Jun, Modified A5/1Stream Cipher using S-boxes.
  10. PatrikEkdahl and Thomas Johansson, Another Attack on . A5/11, ISIT2001, Washington, DC, June 24-29, 2001
  11. PatrikEkdahl and Thomas Johansson, Another Attack on A5/1, IEEE transactions on information theory, vol. 49, no. 1, January 2003
  12. A précis of the new attacks on GSM encryption Greg Rose, QUALCOMM Australia.
  13. MohmedSharaf I, HalaA. K. Mansour', HalaH. Zayed3, M L Shore, a complex linear feedback shift register design for the a5 key stream generator, Twenty Second National Radio Science Conference (NRSC 2005).
  14. David Horant and Richard Guinee, A Novel Key stream Generator using Pseudo Random Binary Sequences for Cryptographic Applications, ISSC 2006, Dublin Institute of Technology, June 28-30.
  15. Musheer Ahmad and Izharuddin, Security Enhancements in GSM Cellular Standard, ©2008 IEEE.
  16. Enhanced a5/1 cipher with improved linear complexity ,musheerahmad and izharuddin
  17. HadiKhorrami, Mahmoud Ahmadian, BehrouzHajian, The New Results of Correlation Attack on A5/1, IEEE-2010
  18. Bruce Schneier. Applied Cryptography: Protocols, Algorithms and Source Code in C, Second Edition. Jon Wiley &Cons, Inc. 1996. ISBN 0-471-12845-7. Page 382 of section 16. 4: Stream Ciphers Using LFSRs.
  19. Security enhancements for a5/1 without losing hardware efficiency in future mobile systems,n. komninos, 'b. honary, m. Darnel1
  20. Cagdas CALIK, meiltem SONMEZ TURAN and ferrukozbudak, "On feedback functions of maximum length non-linear feedback shift registers",IEICE TRANS,2010
Index Terms

Computer Science
Information Sciences

Keywords

GSM Encryption A5/1 stream cipher Clock Controlling Unit Correlation Statistical testing NLFSR (non-linear feedback function)