Please use this identifier to cite or link to this item: http://dr.iiserpune.ac.in:8080/xmlui/handle/123456789/170
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorMAHALANOBIS, AYANen_US
dc.contributor.authorSHAH, JAYen_US
dc.date.accessioned2012-05-04T06:20:49Z
dc.date.available2012-05-04T06:20:49Z
dc.date.issued2012-05en_US
dc.identifier.urihttp://dr.iiserpune.ac.in:8080/xmlui/handle/123456789/170-
dc.description.abstractIn Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this thesis, we study the A5/1 and some known attacks on it. We explore the weaknesses of the cipher and suggest certain modifications to the A5/1 encryption scheme with an aim to create a more secure cryptosystem resistant to most of the attacks already known. We have also designed a new attack on the A5/1 stream cipher with a minimum space complexity of around 2^(40) and an average complexity of 2^(48.5), which is much less than the brute-force attack with a complexity of 2^(64). We provide a detailed description of our new attack along with its implementation and results. Various statistical tests for randomness were performed on the suggested variants of the A5/1 which prove that these modified stream ciphers are pseudo random number generators.en_US
dc.language.isoenen_US
dc.subject2012
dc.subjectA5/1en_US
dc.subjectGSMen_US
dc.subjectGuess-and-Determine attacken_US
dc.subjectStream Ciphersen_US
dc.titleCryptanalysis of the A5/1 Stream Cipheren_US
dc.typeThesisen_US
dc.type.degreeBS-MSen_US
dc.contributor.departmentDept. of Mathematicsen_US
dc.contributor.registration20071039en_US
Appears in Collections:MS THESES

Files in This Item:
File Description SizeFormat 
shah.pdf1.09 MBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.