IJSER Home >> Journal >> IJSER
International Journal of Scientific and Engineering Research
ISSN Online 2229-5518
ISSN Print: 2229-5518 10    
Website: http://www.ijser.org
scirp IJSER >> Volume 3,Issue 10,October 2012
Furtherance of Elliptic Curve Cryptography Algorithm in the field of GSM security
Full Text(PDF, )  PP.419-428  
Author(s)
Satarupa Chakraborty
KEYWORDS
elliptic curve cryptography, RSA, GSM, security, cryptography, finite field, discrete logarithmic problem
ABSTRACT
Mobile Phones have totally changed the world; nowadays people can afford to forget their daily household needs but not their own mobile phones. This increasing popularity has sensed a huge growth in the acceptance of modern mobile phones. With the increas
References
[1] REHAB EL NEMR, IMANE ALY SAROIT ISMAIL, S. H. AHMED: ACTION- TRIGGERED PUBLIC-KEY CRYPTOGRAPHY FOR GSM SYSTEMS WITH PHONE- DEPENDENT END-TO-END ENCRYPTION, VOL (5), ISSUE (2), JUNE 2006, WWW.ICGST.COM/CNIR/VOLUME5/ISSUE2/P1140626001.PDF

[2] JEREMY QUIRKE, “SECURITY IN THE GSM SYSTEM”, MAY 2004, WWW.IT.IITB.AC.IN/~KAVITA/GSM_SECURITY_PAPERS/SECU RITY IN THE GSM SYSTEM 01052004.PDF

[3] AUDREY SELIAN, LARA SRIVASTAVA: 3G MOBILE LICENSING POLICY: FROM GSM TO IMT-2000 - A COMPARATIVE ANALYSIS.

[4] TUAN HUYNH AND HOANG NGUYEN: OVERVIEW OF GSM AND GSM SECURITY DEPARTMENT OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE OREGON STATE UNIVERSITY JUNE 06, 2003,HTTP://WWW.DCELL.COM/SETYOBUDIANTO/RESOURCES/GSM/OVERVIEW_ GSM_SECURITY.PDF

[5] BROOKSON, C, GSM MOU SECURITY RAPPORTEUR, BRITISH TELECOMMUN. PLC, LONDON: GSM SECURITY: A DESCRIPTION OF THE REASONS FOR SECURITY AND THE TECHNIQUES ISSUE DATE: 1994, ON PAGE(S): 2/1 - 2/4, DATE OF CURRENT VERSION: 06 AUGUST 2002

[6] THE SECURE SOCKETS LAYER (SSL) PROTOCOL VERSION 3.0, ISSN: 2070-1721, AUGUST 2011, TOOLS.IETF.ORG/HTML/RFC6101.

[7] SECURE ELECTRONIC TRANSACTION (SET) PROTOCOL, VOL. 6, WWW.ISACA.ORG/JOURNAL/PASTISSUES/2000/VOLUME-6/PAGES/SECURE-ELECTRONICTRANSACTION-SET-PROTOCOL.ASPX

[8] MRS. S. PRASANNA GANESAN: AN EFFICIENT PROTOCOL FOR RESOURCE CONSTRAINED PLATFORMS USING ECC, VOL.2 (1), 2009, PP. 89-91, WWW.ENGGJOURNALS.COM/IJCSE/DOC/IJCSE10-02-01-16.PDF

[9] HTTP://WWW.PRIVATELINE.COM/MT_GSMHISTORY/04_ARC HITECTURE_OF_THE_GSM_NETWORK/

[10] MOHSEN TOORANI, ALI ASGHAR BEHESHTI SHIRAZI: SOLUTIONS TO THE GSM SECURITY WEAKNESSES, ISSUE DATE: 16-19 SEPT. 2008, PP. 576-581, DATE OF CURRENT VERSION: 20 JANUARY 2009, IEEEXPLORE.IEEE.ORG/STAMP/STAMP.JSP?TP=&ARNUMBER= 4756489

[11] THE GSM SECURITY TECHNICAL WHITEPAPER FOR 2002: HTTP://WWW.HACKCANADA.COM/BLACKCRAWL/CELL/GS M/GSM_SECURITY.HTML

[12] CHARLES BROOKSON: GSM (AND PCN) SECURITY AND ENCRYPTION, WWW.BROOKSON.COM/GSM/GSMDOC.PDF

[13] HTTP://WWW.GARYKESSLER.NET/LIBRARY/CRYPTO.HTML [14] FRANCIS CROWE, ALAN DALY AND WILLIAM MARNANE: A SCALABLE DUAL MODE ARITHMETIC UNIT FOR PUBLIC KEYCRYPTOSYSTEMS, PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: CODING AND COMPUTING (ITCC’05) 0-7695- 2315-3/05, IEEEXPLORE.IEEE.ORG/STAMP/STAMP.JSP?ARNUMBER=01428 523

[15] RSA LABORATORIES: HTTP://WWW.RSA.COM/RSALABS/NODE.ASP?ID=2167

[16] VIVEK B.KUTE, P. R. PARADHI, G. R. BAMNOTE: A SOFTWARE COMPARISON OF RSA AND ECC, VOL. 2, NO. 1, MAY 2009, ISSN: 0974-1003, WWW.RESEARCHPUBLICATIONS.ORG/IJCSA/ISSUE4/2009- IJCSA-02-01-15.PDF

[17] SUKALYAN GOSWAMI, SATARUPA CHAKRABORTY, SUBARNA LAHA, ANKANA DHAR: ENHANCEMENT OF GSM SECUTITY USING ELLIPTIC CURVE CRYPTOGRAPHY, ISMS 2012, PUBLICATION YEAR: 2012, PAGE(S): 639 – 644

[18] SAMEER HASAN AL-BAKRI, M.L. MAT KIAH, A.A. ZAIDAN, B.B. ZAIDAN, GAZI MAHABUBUL ALAM: SECURING PEERTO-PEER MOBILE COMMUNICATIONS USING PUBLIC KEY CRYPTOGRAPHY: NEW SECURITY STRATEGY, VOL.6(4), PP. 932-938, 18 FEBRUARY 2011

[19] WANG SULI, LIU GANLAI: FILE ENCRYPTION AND DECRYPTION SYSTEM BASED ON RSA ALGORITHM, ISSUE DATE: 21-23 OCT. 2011, PP. 797-800, DATE OF CURRENT VERSION: 28 NOVEMBER 2011, IEEEXPLORE.IEEE.ORG/STAMP/STAMP.JSP?TP=&ARNUMBER= 6086320

[20] ANOOP MS: ELLIPTIC CURVE CRYPTOGRAPHY, WWW.TATAELXSI.COM/WHITEPAPERS/ECC_TUT_V1_0.PDF?P DF_ID=PUBLIC_KEY_TEL.PDF

[21] THE CASE FOR ELLIPTIC CURVE CRYPTOGRAPHY-NSA/CSS, 15 JAN. 2009, WWW.NSA.GOV/BUSINESS/PROGRAMS/ELLIPTIC_CURVE.SH TML

[22] RSA LABORATORIES, OVERVIEW OF ELLIPTIC CURVE CRYPTOSYSTEMS, HTTP://WWW.RSA.COM/RSALABS/NODE.ASP?ID=2013

[23] KRISTIN LAUTER, MICROSOFT CORPORATION: THE ADVANTAGES OF ELLIPTIC CURVE CRYPTOGRAPHY FOR WIRELESS SECURITY, HTTP://RESEARCH.MICROSOFT.COM/ENUS/UM/PEOPLE/KLAUTER/IEEEFINAL.PDF.

[24] DAN BONEH: REVIEW OF SEC1: ELLIPTIC CURVE CRYPTOGRAPHY, HTTP://WWW.SECG.ORG/COLLATERAL/SEC1REVIEW.PDF

[25] JIA XIANGYU WANG CHAO: THE APPLICATION OF ELLIPTIC CURVE CRYPTOSYSTEM IN WIRELESS COMMUNICATION, 2005 IEEE, AND IEEEXPLORE.IEEE.ORG/STAMP/STAMP.JSP?TP=&ARNUMBER= 1618234

[26] SELCUK BAKTIR: FREQUENCY DOMAIN FINITE FIELD ARITHMETIC FOR ELLIPTIC CURVE CRYPTOGRAPHY

[27] ALFRED MENEZES: EVALUATION OF SECURITY LEVEL OF CRYPTOGRAPHY: THE ELLIPTIC CURVE DISCRETE LOGARITHM PROBLEM (ECDLP), DECEMBER 14, 2001

[28] HTTP://WWW.DKRYPT.COM/HOME/ECC#TOC-ELLIPTICCURVE-DOMAIN-PARAMETERS

[29] HTTP://PLANETMATH.ORG/ELLIPTICCURVEDISCRETELOGA RITHMPROBLEM.HTML

[30] DARREL HANKERSON, JULIO LOPEZ HERNANDEZ, ALFRED MENEZES, SOFTWARE IMPLEMENTATION OF ELLIPTIC CURVE CRYPTOGRAPHY OVER BINARY FIELDS, 2000, AVAILABLE AT HTTP://CITESEER.IST.PSU.EDU/HANKERSON00SOFTWARE.HT ML

[31] XU HUANG, PRITAM SHAH, AND DHARMENDRA SHARMA: FAST ALGORITHM IN ECC FOR WIRELESS SENSOR NETWORK, MARCH 17-19, 2010, PROCEEDINGS OF THE INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS 2010 VOL II, IMECS 2010.

[32] HTTP://LIBRARY.THINKQUEST.ORG/C0126342/DH.HTM

[33] MONCEF AMARA AND AMAR SAID: ELLIPTIC CURVE CRYPTOGRAPHY AND ITS APPLICATIONS, ISSUE DATE: 9-11 MAY 2011, PP. 247-250, DATE OF CURRENT VERSION: 27 JUNE 2011

[34] DON JOHNSON AND ALFRED MENEZES AND SCOTT VANSTONE: THE ELLIPTIC CURVE DIGITAL SIGNATURE, HTTP://CS.UCSB.EDU/~KOC/CCS130H/NOTES/ECDSACERT.PDF

[35] ARUN KUMAR, DR. S.S. TYAGI, MANISHA RANA, NEHA AGGARWAL, PAWAN BHADANA: A COMPARATIVE STUDY OF PUBLIC KEY CRYPTOSYSTEM BASED ON ECC AND RSA, INTERNATIONAL JOURNAL ON COMPUTER SCIENCE AND ENGINEERING (IJCSE), ISSN: 0975-3397, VOL. 3 NO. 5 MAY 2011 [36] MASOOD HABIB, TAHIR MEHMOOD, FASEE ULLAH, AND MUHAMMAD IBRAHIM: PERFORMANCE OF WIMAX SECURITY ALGORITHM (THE COMPARATIVE STUDY OF RSA ENCRYPTION ALGORITHM WITH ECC ENCRYPTION ALGORITHM), 13-15TH NOV. 2009, VOL. 2, PP. 108-112, IEEEXPLORE.IEEE.ORG/STAMP/STAMP.JSP?TP=&ARNUMBER= 5360117

[37] AVANINDRA KUMAR LAL, SANDIP DUTTA: ECC BASED BIOMETRIC ENCRYPTION FOR NETWORK SECURITY, JOURNAL OF COMPUTING, VOLUME 3, ISSUE 6, JUNE 2011, ISSN 2151-9617

Untitled Page