Telecoms, Datacoms, Wireless, IoT


Encryption system for GSM comunications

30 September 2009 Telecoms, Datacoms, Wireless, IoT

A company called Secusmart has developed an advanced encryption and authentication system to provide secure cellphone communication.

According to André Stürmer, operations director of the TriVest Group, South African distributors of the German developed Secusmart chip: “The hard fact about cellphone security is that you should always assume you have unwanted listeners. In countries where more and more business is conducted over the mobile phone network, such as is the case in Africa, this is particularly relevant.”

GSM-based communications can be attacked in three different ways:

1. An attack on the transmission network.

2. An attack on the air interface.

3. An attack by ID spoofing.

During an attack on the transmission network, the speech data is transferred clearly, and can be intercepted through legal as well as illegal measures. Air interfaces can be actively and passively attacked. An active attack on the air interface is performed by an IMSI catcher. The IMSI catcher makes use of the lack of authentication between the network and the mobile phone and intercepts the data by placing the phone on its ‘private’ network. Additionally, the IMSI catcher disconnects the normal GSM encryption. Not only does the cost of around R2 million limit its use, but it is also difficult to deploy and the active interception means that the use of the IMSI catcher can be traced.

A passive attack of the air interface requires cracking the A5/1 encryption. The two possibilities are:

1. GSS ProA - GSM interceptor

* On-the-fly decryption of up to 100 speech connections.

* Simultaneous interception and content analysis.

* Cost is approximately R750 000.

2. Open-source projects

GSM cracking project/A5 busters

<i.* Hardware costs between R10 000 and R45 000.</i>

The threat by this type of attack is high, as the interception cannot be traced and the entry barrier is low.

The cheapest alternative is to duplicate the caller ID – this is known as ID spoofing. Sites such as www.spoofcard.com show how easy and cheap this type of attack can be. The invader communicates the false call number and the victim trusts the number, resulting in them divulging confidential information. This threat by caller ID spoofing is extremely high because it is possible with any telephone.

These points illustrate that secure mobile communication requires more than just encryption. For this reason, Secusmart’s solution ensures encryption and authentication. Certificate authentication protects against caller ID spoofing thanks to the public key infrastructure (PKI). The Secusmart solution is independent of the mobile phone and it requires no changes to the device. The usage is simple, does not impede normal phone usage, no loss of battery time and intuitive handling, with no degradation in speech quality.

The solution makes use of crypto hardware integrated in a microSD card, which encrypts voice calls end-to-end using a 128-bit AES encryption algorithm. Authentication is certificate-based, using an elliptic curve Diffie-Hellmann key exchange and with a key agreement within 3 seconds. The microSD card is a standard chip for mobile data storage with up to 2 GB Flash storage. Additionally, it contains a secure PKI smartcard controller (NXP SmartMX P5CC072) with TCOS 4.0 operating system. The design has a high-speed AES co-processor which consumes little battery power and securely stores key information.

For more information contact André Stürmer, Trivest, +27 (0)82 052 6824.





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Smart farming with LoRaWAN
Otto Wireless Solutions Telecoms, Datacoms, Wireless, IoT
Real-time visibility is transforming modern agriculture, and Otto Wireless Solutions, together with Dragino, deliver this capability through a comprehensive suite of long-range IoT sensors and gateways designed for smart farming.

Read more...
RTK-enhanced GNSS and INS solution
Dizzy Enterprises Telecoms, Datacoms, Wireless, IoT
This latest XSENS MTi-8 Click provides high-accuracy positioning (RTK-supported) and orientation tracking in demanding outdoor embedded applications.

Read more...
High-performance double balanced RF mixer
RFiber Solutions Telecoms, Datacoms, Wireless, IoT
The AM5008 from Mercury Systems is a high-performance, double-balanced MMIC mixer designed for wideband applications spanning 2 GHz to 24 GHz.

Read more...
Compact NFC antennas enable easy integration
Telecoms, Datacoms, Wireless, IoT
Leankon has expanded its 13,56 MHz NFC antenna portfolio with a comprehensive suite of nine off the shelf products designed for next generation IoT applications.

Read more...
Ultra-low jitter clocks
Altron Arrow Telecoms, Datacoms, Wireless, IoT
Skyworks has introduced a new family of ultra-low jitter programmable clocks designed to meet the increasing demands of next-gen connectivity.

Read more...
Efficient Bluetooth SoC
Altron Arrow Telecoms, Datacoms, Wireless, IoT
The EFR32BG29 wireless SoC from Silicon Labs is a highly efficient, high memory, low-power, and ultra compact SoC designed for secure and high-performance wireless networking for IoT devices.

Read more...
Minimal size, maximum flexibility
Würth Elektronik eiSos Telecoms, Datacoms, Wireless, IoT
Würth Elektronik has introduced two highly compact radio modules that give developers maximum freedom in designing proprietary wireless solutions that go beyond standard protocols.

Read more...
Super Wi-Fi extends industrial connectivity
NEC XON Telecoms, Datacoms, Wireless, IoT
Africa’s harshest mines, ports, and industrial parks are no longer bound by range, latency, and interference challenges.

Read more...
HackRF Pro advances Open SDR performance
IOT Electronics Telecoms, Datacoms, Wireless, IoT
Designed for engineers, researchers, and radio enthusiasts alike, the HackRF Pro can transmit and receive signals across a wide frequency range of 100 kHz to 6 GHz, making it a versatile tool for testing and developing modern and emerging radio technologies.

Read more...
Deterministic high-speed Ethernet
Telecoms, Datacoms, Wireless, IoT
The Fraunhofer Institute for Photonic Microsystems IPMS has developed a new 10G TSN endpoint IP Core, enabling deterministic real-time communication at data rates of up to 10 Gbit/s.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved