A study of cryptographic algorithms in mobile communications
Other Title(s)
دراسة خوارزميات التشفير في مجال الاتصالات الخلوية
Dissertant
Thesis advisor
Comitee Members
Atum, Jalal Yusuf
al-Qaddumi, Ashraf Ahmad
Ubayd, Nadim
University
Princess Sumaya University for Technology
Faculty
King Hussein Faculty for Computing Sciences
Department
Department of Computer Sciences
University Country
Jordan
Degree
Master
Degree Date
2013
English Abstract
Security is crucial in communication systems, and mobile communication systems have unique challenges that need to be catered for.
Current systems deploy multiple algorithms to provide confidentiality, integrity and authentication, however, due to design decisions in early mobile communication systems, many security vulnerabilities and weaknesses were discovered that carried on to the newer generations of mobile communication.
The Global System for Mobile Communications (GSM) is the most widely used cellular technology in the world, and thus its security and underlying algorithms are the most subjected to analysis and study.
GSM does not provide sufficient security for users with very valuable information to communicate.
These users are advised to use an additional layer of security on top of GSM, which this thesis attempts to provide.
In this thesis, a framework for a secure and distributed Voice over IP (VoIP) is proposed.
The framework relies on the concept of Distributed Hash Tables (DHT) for locating other peers, the Z-Real-time Transport Protocol (ZRTP) for securely exchanging the cryptographic keys that are then used in the Secure Real-time Transport Protocol (SRTP), which provides encryption for the voice data. A simulation was developed to demonstrate the viability of DHT networks as an alternative to centralized deployments where a client uses the DHT to register itself and lookup other devices.
Main Subjects
Topics
No. of Pages
80
Table of Contents
Table of contents.
Abstract.
Chapter One : Introduction.
Chapter Two : Related work.
Chapter Three : Current cryptographic algorithms.
Chapter Four : The proposed framework.
Chapter Five : Discussion, conclusions and future work.
References.
American Psychological Association (APA)
Akkash, Ahmad Suhayl. (2013). A study of cryptographic algorithms in mobile communications. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology, Jordan
https://search.emarefa.net/detail/BIM-413795
Modern Language Association (MLA)
Akkash, Ahmad Suhayl. A study of cryptographic algorithms in mobile communications. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology. (2013).
https://search.emarefa.net/detail/BIM-413795
American Medical Association (AMA)
Akkash, Ahmad Suhayl. (2013). A study of cryptographic algorithms in mobile communications. (Master's theses Theses and Dissertations Master). Princess Sumaya University for Technology, Jordan
https://search.emarefa.net/detail/BIM-413795
Language
English
Data Type
Arab Theses
Record ID
BIM-413795