A study of cryptographic algorithms in mobile communications

العناوين الأخرى

دراسة خوارزميات التشفير في مجال الاتصالات الخلوية

مقدم أطروحة جامعية

Akkash, Ahmad Suhayl

مشرف أطروحة جامعية

Ujan, Arafat

أعضاء اللجنة

Atum, Jalal Yusuf
al-Qaddumi, Ashraf Ahmad
Ubayd, Nadim

الجامعة

جامعة الأميرة سمية للتكنولوجيا

الكلية

كلية الملك الحسين لعلوم الحوسبة

القسم الأكاديمي

قسم علم الحاسوب

دولة الجامعة

الأردن

الدرجة العلمية

ماجستير

تاريخ الدرجة العلمية

2013

الملخص الإنجليزي

Security is crucial in communication systems, and mobile communication systems have unique challenges that need to be catered for.

Current systems deploy multiple algorithms to provide confidentiality, integrity and authentication, however, due to design decisions in early mobile communication systems, many security vulnerabilities and weaknesses were discovered that carried on to the newer generations of mobile communication.

The Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world, and thus its security and underlying algorithms are the most subjected to analysis and study.

GSM does not provide sufficient security for users with very valuable information to communicate.

These users are advised to use an additional layer of security on top of GSM, which this thesis attempts to provide.

In this thesis, a framework for a secure and distributed Voice over IP (VoIP) is proposed.

The framework relies on the concept of Distributed Hash Tables (DHT) for locating other peers, the Z-Real-time Transport Protocol (ZRTP) for securely exchanging the cryptographic keys that are then used in the Secure Real-time Transport Protocol (SRTP), which provides encryption for the voice data. A simulation was developed to demonstrate the viability of DHT networks as an alternative to centralized deployments where a client uses the DHT to register itself and lookup other devices.

التخصصات الرئيسية

الرياضيات

الموضوعات

عدد الصفحات

80

قائمة المحتويات

Table of contents.

Abstract.

Chapter One : Introduction.

Chapter Two : Related work.

Chapter Three : Current cryptographic algorithms.

Chapter Four : The proposed framework.

Chapter Five : Discussion, conclusions and future work.

References.

نمط استشهاد جمعية علماء النفس الأمريكية (APA)

Akkash, Ahmad Suhayl. (2013). A study of cryptographic algorithms in mobile communications. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology, Jordan
https://search.emarefa.net/detail/BIM-413795

نمط استشهاد الجمعية الأمريكية للغات الحديثة (MLA)

Akkash, Ahmad Suhayl. A study of cryptographic algorithms in mobile communications. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology. (2013).
https://search.emarefa.net/detail/BIM-413795

نمط استشهاد الجمعية الطبية الأمريكية (AMA)

Akkash, Ahmad Suhayl. (2013). A study of cryptographic algorithms in mobile communications. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology, Jordan
https://search.emarefa.net/detail/BIM-413795

لغة النص

الإنجليزية

نوع البيانات

رسائل جامعية

رقم السجل

BIM-413795