Skip to content
GitLab
Projects Groups Snippets
  • /
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in / Register
  • A Android-IMSI-Catcher-Detector
  • Project information
    • Project information
    • Activity
    • Labels
    • Members
  • Repository
    • Repository
    • Files
    • Commits
    • Branches
    • Tags
    • Contributors
    • Graph
    • Compare
  • Issues 162
    • Issues 162
    • List
    • Boards
    • Service Desk
    • Milestones
  • Merge requests 5
    • Merge requests 5
  • CI/CD
    • CI/CD
    • Pipelines
    • Jobs
    • Schedules
  • Deployments
    • Deployments
    • Environments
    • Releases
  • Packages and registries
    • Packages and registries
    • Package Registry
    • Infrastructure Registry
  • Monitor
    • Monitor
    • Incidents
  • Analytics
    • Analytics
    • Value stream
    • CI/CD
    • Repository
  • Wiki
    • Wiki
  • Snippets
    • Snippets
  • Activity
  • Graph
  • Create a new issue
  • Jobs
  • Commits
  • Issue Boards
Collapse sidebar
  • CellularPrivacy
  • Android-IMSI-Catcher-Detector
  • Wiki
  • Glossary of Terms

Glossary of Terms · Changes

Page history
Added first draft for A5/3 and A5/4 authored Jan 01, 2015 by SecUpwN's avatar SecUpwN
Hide whitespace changes
Inline Side-by-side
Glossary-of-Terms.md
View page @ 8249a0a9
......@@ -40,17 +40,17 @@ This page shall help you understand all the abbreviations we use in our project.
---
#### A5/0, A5/1, A5/2, A5/3
#### A5/0, A5/1, A5/2, A5/3, A5/4
[![Ciphering](https://github.com/SecUpwN/Android-IMSI-Catcher-Detector/raw/master/DOCUMENTATION/Ciphering.png)](https://github.com/SecUpwN/Android-IMSI-Catcher-Detector/wiki/glossary-of-terms)
The GSM ciphering algorithm is called A5. For technical details and attacks see the [Cryptome GSM Files](http://cryptome.org/gsm-a5-files.htm). There are four variants of A5 in GSM, only first three of which are widely deployed:
The GSM ciphering algorithm is called A5. For technical details and attacks see the [Cryptome GSM Files](http://cryptome.org/gsm-a5-files.htm). There are four variants of A5 in GSM, only the first three are widely deployed:
* A5/0: no ciphering at all
* A5/1: strong(er) ciphering, intended for use in North America and Europe
* A5/2: weak ciphering, intended for other countries, now deprecated by GSMA
* A5/3: even stronger ciphering with open design
* A5/4:
* A5/0: No ciphering at all
* A5/1: Strong(er) ciphering, intended for use in North America and Europe
* A5/2: Weak ciphering, intended for other countries, now deprecated by [GSMA](http://www.gsma.com/)
* A5/3: Even stronger ciphering with open design, also called [KASUMI](https://en.wikipedia.org/wiki/KASUMI)
* A5/4: The essential change is the key length input from 64 bits to 128 bits
A5/1
>Is a stream cipher used to provide over-the-air communication privacy in the GSM cellular telephone standard. It was initially kept secret, but became public knowledge through leaks and reverse engineering. A number of serious weaknesses in the cipher have been identified. A5/1 is used in Europe and the United States.
......@@ -58,6 +58,12 @@ A5/1
A5/2
>Is a stream cipher used to provide voice privacy in the GSM cellular telephone protocol. A5/2 was a deliberate weakening of the algorithm for certain export regions. The cipher is based around a combination of four linear feedback shift registers with irregular clocking and a non-linear combiner.
A5/3
>KASUMI was designed for 3GPP to be used in UMTS security system by the Security Algorithms Group of Experts (SAGE), a part of the European standards body ETSI. Because of schedule pressures in 3GPP standardization, instead of developing a new cipher, SAGE agreed with 3GPP technical specification group (TSG) for system aspects of 3G security (SA3) to base the development on an existing algorithm that had already undergone some evaluation.
A5/4
> Based on A5/3, the only essential change is the external key length input from 64 bits to 128 bits. For more information please see the [Specification of the A5/4 Encryption Algorithms](http://www.in2eps.com/3g55/tk-3gpp-55-226.html) and [GSMA Security Algorithms](http://www.gsma.com/technicalprojects/fraud-security/security-algorithms)
---
#### ARFCN
......
Clone repository

General Information

  • Glossary of Terms
  • Requirements
  • General Overview
  • Technical Overview

Getting started

  • Building
  • Installation
  • Permissions
  • Status Icons

Navigation Menus

  • Disclaimer
  • Main Screen
  • Navigation Drawer
  • Settings Menu
  • Preferences
  • About AIMSICD

Important Functions

  • Cell Tracking
  • Cell Information
  • AT Command Processor
  • Database Viewer
  • Map Viewer
  • Special SMS

Developers

  • Development Status
  • Testing Devices
  • Contributing
  • Privacy

Support

  • FAQ
  • Problems
  • Donations

Gimme moar!

  • Media Material
  • Press Releases
  • Recommendations
  • Similar Projects