Telecoms, Datacoms, Wireless, IoT


Encryption system for GSM comunications

30 September 2009 Telecoms, Datacoms, Wireless, IoT

A company called Secusmart has developed an advanced encryption and authentication system to provide secure cellphone communication.

According to André Stürmer, operations director of the TriVest Group, South African distributors of the German developed Secusmart chip: “The hard fact about cellphone security is that you should always assume you have unwanted listeners. In countries where more and more business is conducted over the mobile phone network, such as is the case in Africa, this is particularly relevant.”

GSM-based communications can be attacked in three different ways:

1. An attack on the transmission network.

2. An attack on the air interface.

3. An attack by ID spoofing.

During an attack on the transmission network, the speech data is transferred clearly, and can be intercepted through legal as well as illegal measures. Air interfaces can be actively and passively attacked. An active attack on the air interface is performed by an IMSI catcher. The IMSI catcher makes use of the lack of authentication between the network and the mobile phone and intercepts the data by placing the phone on its ‘private’ network. Additionally, the IMSI catcher disconnects the normal GSM encryption. Not only does the cost of around R2 million limit its use, but it is also difficult to deploy and the active interception means that the use of the IMSI catcher can be traced.

A passive attack of the air interface requires cracking the A5/1 encryption. The two possibilities are:

1. GSS ProA - GSM interceptor

* On-the-fly decryption of up to 100 speech connections.

* Simultaneous interception and content analysis.

* Cost is approximately R750 000.

2. Open-source projects

GSM cracking project/A5 busters

<i.* Hardware costs between R10 000 and R45 000.</i>

The threat by this type of attack is high, as the interception cannot be traced and the entry barrier is low.

The cheapest alternative is to duplicate the caller ID – this is known as ID spoofing. Sites such as www.spoofcard.com show how easy and cheap this type of attack can be. The invader communicates the false call number and the victim trusts the number, resulting in them divulging confidential information. This threat by caller ID spoofing is extremely high because it is possible with any telephone.

These points illustrate that secure mobile communication requires more than just encryption. For this reason, Secusmart’s solution ensures encryption and authentication. Certificate authentication protects against caller ID spoofing thanks to the public key infrastructure (PKI). The Secusmart solution is independent of the mobile phone and it requires no changes to the device. The usage is simple, does not impede normal phone usage, no loss of battery time and intuitive handling, with no degradation in speech quality.

The solution makes use of crypto hardware integrated in a microSD card, which encrypts voice calls end-to-end using a 128-bit AES encryption algorithm. Authentication is certificate-based, using an elliptic curve Diffie-Hellmann key exchange and with a key agreement within 3 seconds. The microSD card is a standard chip for mobile data storage with up to 2 GB Flash storage. Additionally, it contains a secure PKI smartcard controller (NXP SmartMX P5CC072) with TCOS 4.0 operating system. The design has a high-speed AES co-processor which consumes little battery power and securely stores key information.

For more information contact André Stürmer, Trivest, +27 (0)82 052 6824.





Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

What does Wi-Fi 7 mean for South African networks?
Telecoms, Datacoms, Wireless, IoT
With Wi-Fi 7 (802.11be), we are finally looking at a standard that was built, not just for more devices, but for the new way networks are used.

Read more...
Multiprotocol wireless SoC
RF Design Telecoms, Datacoms, Wireless, IoT
The nRF54LM20A from Nordic Semiconductor is a multiprotocol wireless System-on-Chip designed for demanding designs in Bluetooth devices.

Read more...
High performance communication
iCorp Technologies Telecoms, Datacoms, Wireless, IoT
Quectel’s FCS950R is a high-performance Wi-Fi 5 and Bluetooth 4.2 module that can deliver a maximum data rate up to 433,3 Mbps in 802.11ac mode.

Read more...
Expanded STM32WL3x line for IoT sensors
Altron Arrow Telecoms, Datacoms, Wireless, IoT
The STM32WL31x and STM32WL30x are more tailored versions of the STM32WL33x for designers who wish to focus on specific features, while lowering their bill of materials.

Read more...
Full-band GNSS helical antenna
RF Design Telecoms, Datacoms, Wireless, IoT
A key feature of Calian’s HC3990XF antenna design is that it does not require a ground plane, making it ideal for size-constrained applications.

Read more...
BLE and BT Mesh module
iCorp Technologies Telecoms, Datacoms, Wireless, IoT
The HM-BT4531 from HOPERF is a BLE data transmission module that features an ARM Cortex-M0 32-bit processor.

Read more...
Espressif entering the Wi-Fi 6E market
iCorp Technologies Telecoms, Datacoms, Wireless, IoT
Espressif Systems is entering the Wi-Fi 6E market, extending its connectivity portfolio into the domain of high-throughput, low-latency wireless solutions.

Read more...
Ultra-low jitter clock buffers
Altron Arrow Telecoms, Datacoms, Wireless, IoT
New SKY53510/80/40 family of clock fanout buffers from Skyworks are purpose-built for data centres, wireless networks, and PCIe Gen 7 applications.

Read more...
Cutting-edge broadband power amplifier
RFiber Solutions Telecoms, Datacoms, Wireless, IoT
Designed for high efficiency and reliability, the WPGM0206012M from WAVEPIA is a cutting-edge broadband GaN MMIC power amplifier operating from 500 MHz to 8,5 GHz.

Read more...
The trends driving uptake of IoT Platform as a Service
Trinity IoT Editor's Choice Telecoms, Datacoms, Wireless, IoT
IoT platforms, delivered as a service, are the key that will enable enterprises to leverage a number of growing trends within the IT space, and access a range of benefits that will help them grow their businesses.

Read more...









While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd | All Rights Reserved