A study of cryptographic algorithms in mobile communications

Other Title(s)

دراسة خوارزميات التشفير في مجال الاتصالات الخلوية

Dissertant

Akkash, Ahmad Suhayl

Thesis advisor

Ujan, Arafat

Comitee Members

Atum, Jalal Yusuf
al-Qaddumi, Ashraf Ahmad
Ubayd, Nadim

University

Princess Sumaya University for Technology

Faculty

King Hussein Faculty for Computing Sciences

Department

Department of Computer Sciences

University Country

Jordan

Degree

Master

Degree Date

2013

English Abstract

Security is crucial in communication systems, and mobile communication systems have unique challenges that need to be catered for.

Current systems deploy multiple algorithms to provide confidentiality, integrity and authentication, however, due to design decisions in early mobile communication systems, many security vulnerabilities and weaknesses were discovered that carried on to the newer generations of mobile communication.

The Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world, and thus its security and underlying algorithms are the most subjected to analysis and study.

GSM does not provide sufficient security for users with very valuable information to communicate.

These users are advised to use an additional layer of security on top of GSM, which this thesis attempts to provide.

In this thesis, a framework for a secure and distributed Voice over IP (VoIP) is proposed.

The framework relies on the concept of Distributed Hash Tables (DHT) for locating other peers, the Z-Real-time Transport Protocol (ZRTP) for securely exchanging the cryptographic keys that are then used in the Secure Real-time Transport Protocol (SRTP), which provides encryption for the voice data. A simulation was developed to demonstrate the viability of DHT networks as an alternative to centralized deployments where a client uses the DHT to register itself and lookup other devices.

Main Subjects

Mathematics

Topics

No. of Pages

80

Table of Contents

Table of contents.

Abstract.

Chapter One : Introduction.

Chapter Two : Related work.

Chapter Three : Current cryptographic algorithms.

Chapter Four : The proposed framework.

Chapter Five : Discussion, conclusions and future work.

References.

American Psychological Association (APA)

Akkash, Ahmad Suhayl. (2013). A study of cryptographic algorithms in mobile communications. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology, Jordan
https://search.emarefa.net/detail/BIM-413795

Modern Language Association (MLA)

Akkash, Ahmad Suhayl. A study of cryptographic algorithms in mobile communications. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology. (2013).
https://search.emarefa.net/detail/BIM-413795

American Medical Association (AMA)

Akkash, Ahmad Suhayl. (2013). A study of cryptographic algorithms in mobile communications. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology, Jordan
https://search.emarefa.net/detail/BIM-413795

Language

English

Data Type

Arab Theses

Record ID

BIM-413795