You are on page 1of 2

GSM (Global System for Mobile Communications: originally from Groupe Spécial

Mobile) is the world's most popular standard for mobile telephony systems. The GSM
Association estimates that 80% of the global mobile market uses the standard. GSM is
used by over 1.5 billion people[ across more than 212 countries and territories. This
ubiquity means that subscribers can use their phones throughout the world, enabled by
international roaming arrangements between mobile network operators. GSM differs
from its predecessor technologies in that both signaling and speech channels are digital,
and thus GSM is considered a second generation (2G) mobile phone system. This also
facilitates the wide-spread implementation of data communication applications into the
system.

The GSM standard has been an advantage to both consumers, who may benefit from the
ability to roam and switch carriers without replacing phones, and also to network
operators, who can choose equipment from many GSM equipment vendors.] GSM also
pioneered low-cost implementation of the short message service (SMS), also called text
messaging, which has since been supported on other mobile phone standards as well. The
standard includes a worldwide emergency telephone number feature (112).

Newer versions of the standard were backward-compatible with the original GSM
system. For example, Release '97 of the standard added packet data capabilities by means
of General Packet Radio Service (GPRS). Release '99 introduced higher speed data
transmission using Enhanced Data Rates for GSM Evolution (EDGE).

GSM service security

See also: UMTS security

GSM was designed with a moderate level of service security. The system was designed to
authenticate the subscriber using a pre-shared key and challenge-response.
Communications between the subscriber and the base station can be encrypted. The
development of UMTS introduces an optional Universal Subscriber Identity Module
(USIM), that uses a longer authentication key to give greater security, as well as mutually
authenticating the network and the user - whereas GSM only authenticates the user to the
network (and not vice versa). The security model therefore offers confidentiality and
authentication, but limited authorization capabilities, and no non-repudiation.

GSM uses several cryptographic algorithms for security. The A5/1 and A5/2 stream
ciphers are used for ensuring over-the-air voice privacy. A5/1 was developed first and is
a stronger algorithm used within Europe and the United States; A5/2 is weaker and used
in other countries. Serious weaknesses have been found in both algorithms: it is possible
to break A5/2 in real-time with a ciphertext-only attack, and in February 2008, Pico
Computing, Inc revealed its ability and plans to commercialize FPGAs that allow A5/1 to
be broken with a rainbow table attack. The system supports multiple algorithms so
operators may replace that cipher with a stronger one.
On 28 December 2009 German computer engineer Karsten Nohl announced that he had
cracked the A5/1 cipher. According to Nohl, he developed a number of rainbow tables
(static values which reduce the time needed to carry out an attack) and have found new
sources for known plaintext attacks. He also said that it is possible to build "a full GSM
interceptor ... from open source components" but that they had not done so because of
legal concerns.[16]

In 2010, threatpost.com reported that "A group of cryptographers has developed a new
attack that has broken Kasumi, the encryption algorithm used to secure traffic on 3G
GSM wireless networks. The technique enables them to recover a full key by using a
tactic known as a Related-key attack, but experts say it is not the end of the world for
Kasumi."[

Although security issues remain for GSM newer standards and algorithms may address
this. New attacks are growing in the wild which take advantage of poor security
implementations, architecture and development for smart phone applications. Some
wiretapping and eavesdropping techniques hijack the audio input and output providing an
opportunity for a 3rd party to listen in to the conversation. Although this threat is
mitigated by the fact the attack has to come in the form of a Trojan, malware or a virus
and might be detected by security software.

You might also like