GSM Security and Encryption. An overview by David Margrave Ross Anderson, "Subject: A5" (posting to sci.crypt newsgroup,17 Jun 1994) "A Cipher Claimed to Resemble A5" by W. G. Chambers (from "On Random Mappings and Random Permutations", FSE2, 1994) Bruce Schneier, "A5 (from "Applied Cryptography")" (2nd. Edition, 1996) Cryptanalysis of Alleged A5 Stream Cipher by Jovan Dj. Golic (EUROCRYPT '97)
Implementations of the GSM Security algorithms A3, A5, and A8,
An implementation of the GSM A3-A8 algorithm GSM Cloning FAQ by David Wagner, and Wired News Report (April 1998) European Cellular Encryption Algorithms by Bruce Schneier ("Crypto-Gram", 15 Dec 1999)
Overview of the Global System for Mobile Communications by John Scourias (1997) An overview of the GSM system by Javier Gozalvez Sempere (1998)
[ home ]
|