Next Article in Journal
An Innovative Solution for Stair Climbing: A Conceptual Design and Analysis of a Tri-Wheeled Trolley with Motorized, Adjustable, and Foldable Features
Previous Article in Journal
Custom-Tailored Radiology Research via Retrieval-Augmented Generation: A Secure Institutionally Deployed Large Language Model System
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Improvement in the Interception Vulnerability Level of Encryption Mechanism in GSM

1
Department of Naval, Electrical, Electronic and Telecommunications Engineering (DITEN), University of Genova, 16145 Genova, Italy
2
Department of Electrical Engineering, Capital University of Science and Technology, Islamabad 44000, Pakistan
3
Department of Engineering and Architecture, University of Parma, 43121 Parma, Italy
*
Author to whom correspondence should be addressed.
Inventions 2025, 10(4), 56; https://doi.org/10.3390/inventions10040056
Submission received: 12 May 2025 / Revised: 4 July 2025 / Accepted: 7 July 2025 / Published: 14 July 2025

Abstract

Data security is of the utmost importance in the domain of real-time environmental monitoring systems, particularly when employing advanced context-aware intelligent visual analytics. This paper addresses a significant deficiency in the Global System for Mobile Communications (GSM), a widely employed wireless communication system for environmental monitoring. The A5/1 encryption technique, which is extensively employed, ensures the security of user data by utilizing a 64-bit session key that is divided into three linear feedback shift registers (LFSRs). Despite the shown efficacy, the development of a probabilistic model for assessing the vulnerability of breaking or intercepting the session key (Kc) has not yet been achieved. In order to bridge this existing knowledge gap, this study proposes a probabilistic model that aims to evaluate the security of encrypted data within the framework of the Global System for Mobile Communications (GSM). The proposed model implements alterations to the current GSM encryption process by the augmentation of the quantity of Linear Feedback Shift Registers (LFSRs), consequently resulting in an improved level of security. The methodology entails increasing the number of registers while preserving the session key’s length, ensuring that the key length specified by GSM standards remains unaltered. This is especially important for environmental monitoring systems that depend on real-time data analysis and decision-making. In order to elucidate the notion, this analysis considers three distinct scenarios: encryption utilizing a set of five, seven, and nine registers. The majority function is employed to determine the registers that will undergo perturbation, hence increasing the complexity of the bit arrangement and enhancing the security against prospective attackers. This paper provides actual evidence using simulations to illustrate that an increase in the number of registers leads to a decrease in the vulnerability of data interception, hence boosting data security in GSM communication. Simulation results demonstrate that our method substantially reduces the risk of data interception, thereby improving the integrity of context-aware intelligent visual analytics in real-time environmental monitoring systems.

1. Introduction

The advancement of wireless communication technology, exemplified by the Global System for Mobile (GSM), has significantly revolutionized the manner in which individuals engage and exchange information. GSM, as a highly prevalent cellular communication standard, provides a robust and dependable means of transmitting data with enhanced security measures [1]. Ensuring data security is crucial in such systems to safeguard sensitive user information against unauthorized access and interception. The A5/1 encryption technique, which is a fundamental component of GSM security, functions by partitioning a 64-bit session key (Kc) into three linear feedback shift registers (LFSRs). The Linear Feedback Shift Registers (LFSRs) are subsequently merged in accordance with predetermined algorithms in order to produce encrypted data [2].
Nevertheless, despite the established and effective nature of the A5/1 encryption process, there exists a dearth of a complete probabilistic model that assesses the likelihood of compromising or intercepting the session key (Kc). The present study aims to fill a significant need in the literature by proposing an innovative probabilistic model for evaluating the security of encrypted data within the GSM environment. Effective communication plays a key role in our everyday existence. The ability to effectively communicate one’s message at any time and in any location is heavily dependent on the level of connection established with the recipient. During ancient times, individuals employed various methods, such as fire, smoke, and carrier pigeons, to transmit their messages. Over time, it has been recognized that the need for a rapid carrier is essential in order to minimize the time required for message delivery and reduce the loss of crucial information. The radio was created in the 1880s by Guglielmo Marconi [3]. Compared to other methods, the radio is an invention that provides a noticeably faster mode of message transmission. The chosen medium’s intrinsic properties will determine whether data can be successfully sent from one place to another. In 1946, the mobile telephone service (MTS) was first created [4]. Only one party could send a speech at any given time when the radio link was in simplex mode, which it was.
This method’s significant power requirement forced the use of sizeable batteries in the instruments, which was one of its limitations. The Advance Mobile Phone System (AMPS) was introduced to solve this restriction [5]. The AMPS used analog frequency-based modulation and had 666 pairs of speech channels. Narrowband AMPS was developed in 1991 by making changes to the architecture of the Advanced Mobile Phone System (AMPS). The NAMPS is based on the use of time-division multiple access (TDMA), digital modulation, and voice compression techniques [6,7]. However, the introduction of the Mobile Communication System was prompted by the need for greater capacity. Digital Cellular Network is recognized as the initial system that enables a cellular user located in one European country to function seamlessly in another [8]. GSM has seen rapid growth and has emerged as the most widely adopted communications system. The initial implementation of GSM was in the form of a second generation (2G) network, which was first established in Finland. The steady expansion of 2G was a result of technological advancements [9].
Currently, there is a global deployment of 3G cellular systems. The International Telecommunication Union (ITU) established the 3G standards, known as Universal Mobile Telecommunication Systems (UMTS) [10]. Subsequently, the communications industry’s most significant companies became affiliated with the 3rd Generation Partnership Project (3GPP) initiative. The primary objective of this program was to generate the technical requirements for a third generation (3G) telecommunications system. The 3GPP organization is the sole entity entrusted with the job of overseeing the 3G system. The allocation of the radio spectrum for UMTS is consistent between Europe and Japan, although it differs in the United States, where IMT-2000 is dedicated to 2G [11]. The 3G concept demonstrated compatibility with IS-95B systems, enabling their coexistence within the same spectrum concurrently. Subsequently, these allocations were expanded. There exist numerous approaches to improve the infrastructure. Additional specifications for GSM have been transmitted by the 3rd Generation Partnership Project (3GPP) working groups.
With the continuous advancement of technologies [12], it is imperative to enhance the encryption and decryption mechanisms to ensure heightened security for our data. Numerous encryption and decryption mechanisms have been developed and proven to be valuable in the context of wireless mobile communication systems. The A5/1 stream cipher is a modified cryptographic algorithm that is widely employed by GSM. The study proposed the implementation of two novel combinational designs with respective total bit lengths of 64 and 128 bits, which are subsequently realized in hardware [13]. The use of area, efficiency, and power in hardware-level implementation is influenced by the substitution of the XOR function with a multiplexer. This leads to the conclusion that the user has provided a numerical sequence consisting of the numbers [14,15,16]. In another study, the authors made alterations to two hardware-implemented designs and subsequently conducted a comparison of their power consumption with that of the usual design of the A5/1 stream cipher [17]. The abbreviations used in this article are detailed in Table 1.
The findings indicate that there is an inverse relationship between the rate of hardware power consumption and the number of tapping bits utilized in the design. The literature acknowledges that the influence of tapping bits on the security strength of a design, particularly in generating random binary sequences, is minimal. However, it is worth noting that tapping bits do have a positive effect on the performance of the hardware, as evidenced by several studies [18,19,20,21]. The administration of information security is a crucial matter that necessitates efficient handling. In order to protect privacy during the exchange of information, the original data is subjected to encryption. In the GSM (Global System for Mobile) standard, encryption is implemented subsequent to Authentication in order to safeguard the privacy of callers during voice transmission subsequent to signaling [22]. The encryption process in GSM involves utilization of the A5 algorithm family and Linear Feedback Shift Registers (LFSRs). The cryptographic algorithm under consideration exhibits multiple vulnerabilities, hence compromising the assurance of privacy. This study proposes several strategies for enhancing the security of the generated bit stream employed in encryption. The literature has suggested a number of methods to improve the functionality of fingerprint recognition systems (FSRs). These techniques encompass the transformation of linear FSRs into non-linear FSRs, the integration of the user’s present geographical coordinates, and the utilization of pre-existing 32-bit SRES in the authentication process [23,24,25,26]. Moreover, in [27] the authors proposed an end-to-end AES-based encryption approach for smartphones, while the authors in [28] provided a comprehensive survey of encryption algorithms and network vulnerabilities. Additional efforts, including the use of AES-256 [29], reverse engineering techniques [30], and quantum-enhanced authentication protocols [31], highlight the ongoing interest in securing mobile communication systems. For a more in-depth exploration of these techniques, the reader is referred to the detailed discussions in [32,33,34,35,36]. Although the encryption mechanism of GSM is secure, no probabilistic model has yet been formulated to analyze the probability of breaking or the interception of Kc. Therefore, it is required to develop an expression to analyze and enhance the security of the encrypted data. This paper makes the following key contributions:
  • A novel probabilistic model is proposed to assess the vulnerability of GSM A5/1 encryption and it is tested in three encryption scenarios using 5, 7, and 9 LFSRs to evaluate performance and security implications.
  • A closed-form expression is developed to calculate the number of possible key combinations as the number of registers increases.
  • GSM encryption is enhanced by increasing the number of LFSRs (5, 7, and 9) without altering the 64-bit session key length.
  • A majority function-based perturbation is introduced to improve key complexity and resist attacks.
  • Simulations were performed to investigate the impact of increasing LFSRs on data interception risk.
  • Data security is improved for context-aware intelligent visual analytics in real-time environmental monitoring systems.
The rest of the paper is organized as follows: In Section 2, various algorithms used to secure communication are discussed. Section 3 reviews the related work, followed by a discussion of the materials and methods in Section 4. Section 5 presents the simulation results, while Section 6 concludes the study and outlines future research directions.
Table 1. Comparative summary of selected notable studies and their limitations.
Table 1. Comparative summary of selected notable studies and their limitations.
ReferencesTechniquesOutcomeLimitationsKey Findings
[16]Hardware implementation of modified A5/1 stream cipherImproved hardware design for A5/1 modificationLack of detailed dataset or specific performance metricsHardware implementation enhances A5/1 security
[18]Modified A5/1 stream cipher for secured GSM communicationEnhanced A5/1 encryption mechanism for improved securityLimited discussion on potential vulnerabilities of the new algorithmModifications address A5/1 weaknesses
[21]LFSR-based stream cipher (enhanced A5/1)Introduction of enhanced A5/1 variant based on LFSRsNo detailed comparison with the original A5/1 securityLFSR-based variant improves A5/1 security
[25]A5/1 stream cipher modified for secured GSM communicationProposal of modified A5/1 algorithm for GSM securityLack of comprehensive Evaluation against attacksModifications strengthen A5/1 against attacks
[27]Cryptanalysis of alleged A5 stream cipherDetailed analysis of A5 stream cipher vulnerabilitiesLimited discussion on countermeasures or improvementsReveals vulnerabilities and potential attacks on A5/1
[30]Improved guess-and-determine attack on A5/1Introduction of improved attack technique against A5/1Focus primarily on attacking rather than improving A5/1Highlights potential weaknesses in A5/1’s security
[32]Enhancement in feedback polynomials of LFSRProposal of enhancements to A5/1’s LFSR feedback polynomialsLimited Evaluation of proposed enhancements’ effectivenessSuggests modifications to improve A5/1’s cryptographic properties

2. Security Mechanism of GSM

In the field of mobile communications, the transmission of data occurs between a mobile endpoint and either another mobile endpoint or a fixed endpoint. The information provided is of a personal and confidential nature. The transmission should be executed in a manner that significantly mitigates the likelihood of data breaches through hacking. In this context, it is imperative for GSM to function as a secure network in order to uphold the confidentiality of data transmission between the sender and the recipient. Due to the wireless nature of communication between the transmitter and receiver in GSM, an unauthorized individual can exploit the air interface in order to gain unauthorized access to the data of a valid user within the network. Therefore, it is imperative to implement measures to ensure the security of GSM networks by validating the legitimacy of its users. Many cryptographic algorithms are used to secure the data. GSM has a special way to secure data:
  • Authentication
  • Encryption
The three major algorithms used in GSM are A3, A5, and A8. These are introduced by the Security Algorithms Group of Experts (SAGE). The three algorithms mentioned earlier explained as follows:
i.
A3 Algorithm This algorithm is used to authenticate the user by authenticating their SIM card in the GSM network.
ii.
A5 Algorithm After authentication of the user, this algorithm is used to encrypt voice and data. This algorithm has four versions. A5/0 is a dummy cipher, and it is a weak algorithm; A5/1 is used in some parts of the world. The newest version is A5/3, which is based on the KGCORE function for 3GPP mobile communications [37].
iii.
A8 Algorithm This algorithm is used for generating symmetric encryption keys that are used in A5/1 or A5/2 [38]. There are three main components related to GSM Security:
(i)
Base Transceiver Station (BTS) The main function is to generate a random number (RAND) of 128 bits and transfer it to the Mobile station. Its work also includes receiving the SRES and transmitting it to the VLR.
(ii)
Mobile Station (MS) The MS uses A3 and A8 algorithms. Both algorithms use a 128-bit random number (RAND), and the authentication key (Ki) is stored in a SIM. The A8 algorithm produces a 64-bit session key, which is used in encryption, and the A3 algorithm is used to obtain SRES of 32 bits.
(iii)
Visitor Location Register (VLR) The working of VLR is the same as MS; it contains A3 and A8 algorithms. It produces 32-bit SRES, and the received SRES form BTS produced by MS matches its own signed response with the received SRES if they are the same, so authentication is possible [39,40,41]. This is shown in Figure 1 below:
(i)
Authentication Center
Authentication is the first and most important step in GSM security. The GSM authentication center is used to check the authenticity of every SIM card available to users. If authentication fails, then the user is blocked from using the network. On the other hand, when authentication is achieved, the user is allowed to communicate with the network. In the early 1990s, the initial security key of 64 bits seemed to be reasonable, but due to rapid improvements in computing power and successful attacks of brute forces (programs that decode keys or passwords) the length or size of the authentication key was made to be 128 bits. As is common knowledge, the most important aspect of the authentication procedure is the authentication key, which is denoted by the symbol Ki. Therefore, it cannot be transmitted over the air without any protection. It is recommended that it must be placed in a SIM card in MS. [42].
(ii)
Authentication Process
The A3 algorithm is used to authenticate the user; either it is legal to communicate with the network, or the user is blocked. The signed response (SRES) of 32-bit from MS is formed by using the steps so that the subscriber is allowed to communicate with the GSM network:
  • Firstly, the BTS generates a 128-bit random number and then transmits it to the mobile station.
  • Using the A3 algorithm, the cell phone encrypts a random number (RAND), and as a result, a 32-bit signed response is generated. This is shown in Figure 2.
  • In parallel, the VLR can calculate SRES at the same time because it has a copy of the A3 algorithm.
  • The VLR matches the value of receiving SRES with its own calculated SRES value.
  • In the event that the two figures are comparable, the authentication will be approved, and the subscriber will be permitted to use the GSM [43].
A.
Encryption in GSM
The second important step in GSM security is encryption. For this purpose, the session key, denoted by Kc plays a vital role in securing the data. Both parties, i.e., the BTS and MS, must have similar Kc in order to encrypt or decrypt the data. The MS generates the session key (Kc) with the help of the A8 algorithm by taking its authentication key Ki, and the random number (RAND) sent by the BTS. Then, the process of encrypting the data through the session key is carried out using the A5 algorithm.
B.
A5/1 Algorithm
The A5/1 algorithm is utilized for the encryption of data in GSM. For this purpose, 64 bits Kc generated by A8 algorithm are used with a 22-bit frame number denoted as Fn. During the call, the frame number changes, but the session key (Kc) remains the same. Using Kc and the 22-bit frame number, the A5/1 algorithm outputs a 228-bit key stream for the duplex link. A total of 114 bits of this 228-bit keystream are used for MS to BTS link while the rest of 114 bits are used for the BTS to MS link [44,45]. In order to perturb the position of bits, the A5/1 algorithm uses three registers called linear feedback shift registers (LFSR) of lengths of 19, 22, 23 bits. These registers are denoted by R1, R2, and R3 as illustrated in Figure 3.
When the bits are moved to three shift registers, a majority function is applied to select two registers as successors. The step-by-step process of shift register utilization, majority function application and successor selection is shown in Figure 3. After the bits are shifted to the respective registers, a majority rule is applied to elect the successor [46,47,48].
For this purpose, bits from position C1, C2, and C3 are picked from R1, R2, and R3 registers, respectively. The majority rule picks two successors based on bit one or bit zero. The position, with maximum numbers of 1s or 0s will become the successor, like in our example the register R1 and register R3 are the successors as there are two 1s and one 0. In the next step, the two registers R1 and R3 are stepped forward. In register R1, bits are at the position 13th, 16th, 17th, and 18th are taken and XORed with each other. The result is saved at LSB by shifting the register values to the right side. Similarly, from the register R3, the bits from position 7th, 20th, 21st, and 22nd are picked and XORed with each other, saving the result at LSB.
  • Generation of Key Stream Bits
The following steps are used to generate keystream bits from frame counter Fn and session key Kc.
Step 1: The three registers are first initialized as zeroed; the clock will continue till 64 cycles are completed. In this step, each bit of session key (Kc) is XORed in parallel with the MSB’s (Most significant bits) of each register.
Step 2: Now the three registers are clocked for additional cycles with a stop or go clock control. In the second step, 22-bits of frame number Fn are again XORed in parallel with the MSB’s of the three registers, respectively.
Step 3: In this step, the three registers are clocked for 100 additional cycles with a stop or go control. Clocking follows the majority rule. Majority bit is determined based on clocking bit of registers (LFSR1 clocking bit: C1 = 8th bit, LFSR2 clocking bit: C2 = 10th and LFSR3 clocking bit: 10th bit). If the clocking bit of any register is the same as the majority bit, the register is clocked. This process is performed just to mix the frame number (Fn) and session key (Kc) together.
Step 4: In step 4, the three registers are clocked 288 times with stop or go control so that two 114-bit sequences of the output keystream are produced. As shown in Figure 4. The output keystream bits of each register at every cycle are XORed with 114-bits of the plaintext [41].

3. Related Work

In this section, a comprehensive review of the current body of research pertaining to the improvement of security in the GSM communication system is presented. Our analysis specifically emphasizes the modifications suggested in prior studies. In their study, Fauzi et al. [16] introduced a hardware implementation of a modified version of the A5/1 stream cipher. The objective of the authors was to optimize the hardware architecture of the A5/1 algorithm in order to strengthen its resistance against future security breaches. In a separate scholarly publication, the author introduced a modified version of the A5/1 stream cipher with the intention of bolstering the security of GSM transmission. The authors have discussed the potential weaknesses inherent in the original A5/1 algorithm and have proposed enhancements to mitigate these issues.
In a similar vein, the author in [20] presented an improved iteration of the A5/1 algorithm, incorporating linear feedback shift registers (LFSRs). The algorithm was updated with the objective of enhancing the security of A5/1 in order to mitigate future assaults. In the paper above [21], the author introduced a modified version of the A5/1 stream cipher that was specifically designed to enhance the security of GSM communication. The methodology employed by the researchers centered on remedying the vulnerabilities inherent in A5/1 in order to enhance its overall security stance.
The papers under evaluation collectively contribute to the existing body of knowledge pertaining to the strengthening of security in GSM communication by means of modifications made to the A5/1 stream cipher. The proposed enhancements and alterations aim to address the vulnerabilities of A5/1, focusing on its shortcomings and bolstering its overall resilience against prospective attacks. Drawing upon the knowledge acquired from these investigations, as mentioned above, the current investigation presents an innovative probabilistic framework for evaluating the security of encrypted data in GSM communication. Presented below is a comparative Table 1, showcasing the latest techniques that are now considered to be at the forefront of the field.

4. Materials and Methods

Within Cellular Technology, the safeguarding of user data is achieved through the utilization of the A5/1 method. This technique operates by partitioning a 64-bit session key into three distinct registers, namely R1, R2, and R3. The registers are subsequently integrated with a predetermined algorithm to produce encrypted data. According to reference [49]. While the encryption process employed by GSM is considered to be secure, it is worth noting that there is currently no established probabilistic model available for analyzing the likelihood of breaking or intercepting the Kc key. Hence, it is vital to formulate a term that can be utilized for the evaluation of the security of the encrypted data. Moreover, the security of the A5/1 algorithm can be strengthened by utilizing a greater number of registers in accordance with a predetermined norm. The resolution to the issue posited in this scholarly article entails the culmination of comprehensive literature reviews encompassing books, conference proceedings, and journal articles. A probabilistic model was constructed and subsequently implemented in MATLAB® R2020b for the purpose of conducting simulations. The model underwent refinement through the process of variable tuning and parameter narrowing to achieve optimal outcomes.
Furthermore, the reported results were derived using comprehensive simulations that involved the establishment of various security environments. This was performed to assess and confirm the efficacy of the suggested method. The A5/1 encryption algorithm is widely recognized and is used for encryption in Mobile Communication Systems. During the decryption process, the A5/1 algorithm uses a session key, also known as Kc, together with a frame number that is 22 bits long. The A5/1 method makes use of three linear feedback shift registers (LFSRs), each of which has a length of 19, 22, and 23 bits, respectively. These registers are indicated by the letters R1, R2, and R3. The individual segments of each register are subjected to an XOR operation, resulting in the combination of their values. This combined value is then subjected to another XOR operation, representing a single bit of the keystream. The predetermined tap positions of each register are established in advance. The bit positions of register R1 are located at places 13, 16, 17, and 18. The tap positions of register R2 are situated at positions 20 and 21.
Similarly, the bit positions of register R3 may be found at positions 20, 21, and 22, as depicted in Figure 5. The registers are sequentially timed using a majority rule mechanism. Every register in the system is equipped with a clocking bit, denoted as bit 8 for register R1, bit 10 for register R2, and bit 10 for register R3. During each iteration, the majority function is implemented on the clocking bits. Following the application of the majority function, the subsequent registers are chosen for further processing. The generation of keystream bits is facilitated through the utilization of a session key (Kc) and a frame counter (Fn). The three linear feedback shift registers are initialized with a value of zero. These registers undergo 64 clock cycles, during which each bit of Kc is simultaneously XORed with the preceding XORed bits of each register.
Subsequently, the 22-bit frame number undergoes an XOR operation with the feedback of each register. The procedure, as mentioned above, persists for a total of 22 cycles. Subsequently, the registers undergo a clocking process spanning 100 extra cycles, after which the majority rule is applied. The registers are timed for a total of 228 cycles, resulting in the generation of two 114-bit sequences known as keystream bits, which are obtained by XORing the output of each register. This technique is performed utilizing three registers; nevertheless, it is possible to augment the number of registers to bolster security. To enhance data protection, it is possible to augment the number of registers. However, it is crucial to ensure that the number of registers is odd, such as 5, 7, or 9, in order to maintain the functionality of the majority function. If an even number of registers is employed, the majority function may fail to operate effectively, resulting in a tie scenario.
(A) 
Proposed GSM Encryption Mechanism
As previously said, the protection of data consistently remains a significant priority throughout the research community. The dynamic nature of methods and system manipulation poses a significant problem for GSM technology. In the context of data encryption, the conventional GSM technology employs a trio of linear feedback shift registers as an initial stage. Therefore, it is imperative to enhance encryption methodologies in order to seamlessly integrate a secure mechanism with GSM without any detrimental consequences. The provided text consists of a series of numbers [50,51,52]. In order to fulfill this objective, a novel data security architecture is presented, which leverages a greater number of shift registers.
Additionally, a computational model has been formulated to determine the maximum number of registers required to store the 64-bit key. This section presents three scenarios: encryption utilizing five registers, encryption employing seven linear feedback shift registers, and encryption utilizing nine registers. The majority function is employed to determine the registers that will undergo subsequent perturbation, hence increasing the difficulty for potential attackers in discerning the bit arrangement within a register. The operational dynamics of the majority function can be observed in Figure 6, where three Linear Feedback Shift Registers (LFSRs) are utilized, with each register possessing a length of 8 bits.
M = Majority (R1 (3), R2(5), R3(3))
M = Maj (1, 0, 0)
R2 and R3 linear feedback shift registers are successors. Other steps are almost the same to make a keystream bit for each direction for BTS to MS and for MS to BTS.
  • Limitations:
This study is primarily theoretical and relies on simulation-based analysis without implementation in real GSM hardware or networks. The increased number of LFSRs, while improving security, may introduce additional computational complexity, which has not been fully evaluated in terms of processing time, power consumption, or resource constraints in mobile devices. Moreover, the impact of the proposed modifications on GSM protocol compatibility and interoperability with existing infrastructure has not been assessed.
(B) 
Example Scenario
In the given illustration, we augment the register count from 3 to 5, 7, and 9 in order to enhance the security and protection of our data. By maintaining a consistent length of Kc and increasing the number of registers, the likelihood of data loss can be minimized.
When considering the expansion of the register count, it is important to note that the minimum number of bits required should not be less than 2 bits. Each register comprises a minimum of two bits, allowing for the application of the XOR operation. As an illustration, when the bits of Kc are partitioned into five registers, the initial four registers encompass 13 bits apiece, while the fifth register comprises 12 bits.
The registers are denoted as R1, R2, R3, and R4, each possessing a length of 13 bits. Additionally, there is a register named R5, which has a length of 12 bits. The resulting keystream is obtained by performing an XOR operation on the output values of all registers. The XOR operation is applied to the predetermined bits of each register, and the resulting values are then inputted to the left side of each register. The taps of registers R1, R2, R3, and R4, which are subjected to the XOR operation, are located at the 4th, 6th, 12th, and 13th places inside the bit sequence.
The XOR operation is used for the taps of R5, specifically at bit positions 11 and 12. The implementation of a majority rule mechanism synchronizes the registers. The registers R1, R2, R3, and R4 each possess a clocking bit located at position 5. The fifth register in the system is equipped with a clocking bit located at position six, as illustrated in Figure 7. The state of the clocking bit in each of the five registers is recorded, and the majority bit is determined during each cycle. The sole registers that are timed are those that align with the majority bit. When a register is subjected to a clock signal, the taps within the register are subjected to an XOR operation, and the resulting output is then stored in the leftmost position of the register. The keystream is generated by performing an XOR operation on the outputs of each register. The identical process is employed on each register in the A5/1 algorithm for GSM in order to obtain the keystream at the conclusion.
Increasing the length of registers from 3 to their maximum capacity enhances the security and protection of personal or confidential data through encryption mechanisms. The registers are partitioned in a manner that ensures each register has a length greater than or equal to 2 bits as shown in Figure 8. This is necessary in the A5/1 method to ensure effective application of the XOR operation. Additionally, it is important to consider that the quantity of registers should be odd, such as 3, 5, 7, 9, etc. This is because an even number of registers would not allow for the application of the majority rule, as there is a possibility of a tie in certain situations. Increasing the number of registers irregularly enhances the security of data. The vulnerability level of the interception method may substantiate this assertion.
Additionally, it is discussed how to determine the interception risk level of various registers and demonstrated that when the number of registers rises to a certain point, the interception vulnerability level declines.
(C) 
The Proposed Probabilistic Model for Interception in GSM:
In GSM, each user’s data is protected via the A5/1 algorithm, which divides a 64-bit session key into three registers: R1, R2, and R3. As a result, an expression must be created to assess the encrypted data’s security. Furthermore, by using more than three registers with a preset rule, the security of the A5/1 method can be improved.
By increasing the number of shift registers, it is possible to increase data encryption. The proposed system handles the additional number of registers in such a way that the length of the session key Kc is unaffected and remains the same as specified by the GSM standard, given in Algorithm 1 as follow.  
Algorithm 1: Algorithmic Enhancements for Secure A5/1 Stream Cipher Implementation with Increased Registers:
  • Initialize
-
n: the session key Kc’s number of bits
-
D: distinct registers (values 3, 5, 7, 9, …)
-
C6: All possible combinations of bits
2.
Compute Cb using the formula
Cb = (if [Kc * (n − 2D + d)/d]x ∑ [from f = 0 to (*)]) (3)
3.
Compute the probability of interception, pb:
Pb = function (cb)
Note: the function is not provided in the content, but pb is inversely related to Cb.
4.
Check the vulnerability:
If Cb increases, then
-
The probability of interception (Pb) decreased
-
Data becomes more secure
5.
Increase D (number of registers) to enhance security:
While (desired security is not achieved)
-
Increase D by 2 (since D can take values 3, 5, 7, 9)
-
Compute Cb using step 2
-
Compute Pb using step 3
6.
End
It is possible to write the produced calculation for how many different ways an n-bit encryption key may be used in D different registers as
C b = P 1 P 2
where C b is the sum of all possible bit combinations. P1 represents the product of combinations based on the register configuration, while P2 models a binomial mutation process.
P1 and P2 can be given as follows:
P 1 = d = 1 D 1 n 2 D + d d and   P 2 = i = 0 n n i
where n is the session key K c bits. There are D separate registers that can accept the numbers 3, 5, 7, and 9. d is the index that starts from 1 and goes up to D-1 value. Each register can take any length, with a minimum of two bits. Cb can be written as
C b = d = 1 D 1 n 2 D + d d × i = 0 n n i
The probability of interception for the proposed scheme is given below:
P b = 1 C b
where Pb is the probability of interception. C b is the total number of bit combinations in the participating shift registers. This implies that if the number of combinations of C b is increased, the probability of interception of the data will be decreased and vice versa.
According to the link between the number of registers and the susceptibility level of interception, when registers are added, more bit combinations are possible, but the vulnerability degree of interception lowers. In other words, as the number of choices grows, the risk of eavesdropping lowers, and the security and protection of our data improve.

5. Results

In the coming subsections, we provide graphs showing the total number of options and the degree of interception vulnerability when registers are increased. The graphs demonstrate that as the number of registers rises, so does the number of possible bit combinations, but the susceptibility to intercepting the session key (Kc) falls. Figure 9 depicts the link between the number of registers and the number of combinations. The graph demonstrates that as the number of registers rises, so does the total number of bit combinations.
After a specific point, while increasing the number of registers, the combinations of bits start decreasing. Keeping the length of the session key constant, all possible registers versus combinations are shown in Figure 10. There are a maximum number of combinations at a specific number of registers, i.e., 19. The total number of combinations decreases even if the number of registers is increased beyond the number 19.
Figure 11 illustrates a correlation between the number of registers and the vulnerability level of interception. As the number of registers increases, there is a decrease in vulnerability, resulting in enhanced security and protection of data and personal information. This implies that by increasing the registries, the protection of personal or confidential data is enhanced, hence reducing the vulnerability to data breaches.
As the amount of vulnerability in interception diminishes, the susceptibility of the data to compromise is correspondingly reduced. Therefore, it can be demonstrated that when the number of registers in GSM is raised, the number of possible bit combinations also increases, resulting in a decrease in the vulnerability level of interception. The personal data is protected in a manner that reduces its vulnerability to hacking or theft of information.
According to the findings presented in Figure 12, there is a clear correlation between the rise in session key size and the subsequent increase in the number of possible combinations. This increase in combinations directly contributes to a decrease in the vulnerability level of interception. The graph depicted below exhibits a non-linear relationship, although, when plotted on a logarithmic scale, it appears to be linear.
  • The number of combinations:
The mathematical formulation for the number of combinations created with an arbitrary key size n and segmentation group registers D was derived using the method of mathematical induction, as depicted in Figure 13. In order to achieve this objective, a distinct sequence of combinations was generated by utilizing different odd values for the segmentation group registers D while maintaining a fixed key size of n = 8 and n = 16, respectively as shown in Table 2.
In Figure 14, subplot (a) illustrates the correlation between the quantity of registers (D) and the potential number of combinations (combinations). Every individual bar depicted in the plot represents a distinct value of ‘n,’ which corresponds to the size of the cryptographic key. As an illustration, the initial bar represents the values D = 3 and n = 8, indicating that in this particular situation, there exists a total of six potential arrangements of bits within the registers. Likewise, the remaining bars depict various permutations of the letters ‘D’ and ‘n’ together with their respective potential arrangements.
Subplot (b): The relationship between vulnerability level and registers the subplot labeled as (b) serves to demonstrate the correlation between the number of registers (D) and the susceptibility to interception. The vulnerability level exhibits an inverse relationship with the number of combinations, whereby an increase in the number of combinations results in a drop in the vulnerability level. The plot illustrates a negative correlation between the vulnerability level and number of registers, demonstrating that the risk level decreases as the number of registers grows and there are more registers.
Figure 15’s subplot (a) depicts a graphical depiction of the distribution of feasible combinations over many registers (D). The data indicated the occurrence of several conceivable combinations by varying the value of “D”. The histogram illustrates the distribution of combinations and their variations across various registers count effectively.
Using a histogram, subplot (b) investigates the link between vulnerability level and registers. The distribution of vulnerability levels across various numbers of registers (D) is shown in the histogram subplot (b). The data shows how different levels of vulnerability arise at different rates for different values of ‘D.’ The plot makes it simpler to comprehend the link between the vulnerability level and the number of registers. As well as the frequency with which certain vulnerability levels occur. Figure 15’s subplot (a) depicts a graphical depiction of the distribution of feasible combinations over many registers (D). The data indicated the occurrence of several conceivable combinations by varying the value of “D”. The histogram illustrates the distribution of combinations and their variations across various registers count effectively. The association between the number of registers, possible combinations, and degrees of vulnerability in the suggested encryption method may be understood with the use of both datasets. This study shows how increasing the number of registers can improve data security and reduce risks.

6. Conclusions and Future Directions

In summary, this study introduces an innovative methodology for augmenting the security of GSM communication through the introduction of a probabilistic model that assesses the efficacy of the A5/1 encryption algorithm. The model provided in this study demonstrates a definitive correlation between the quantities of linear feedback shift registers (LFSRs) and the likelihood of successfully intercepting encrypted data. The results suggest that augmenting the quantity of Linear Feedback Shift Registers (LFSRs) is associated with enhanced data security, as it diminishes the susceptibility of data interception. By improving the number of LFSRs, our method severely minimizes the danger of information breaches, thereby protecting the value of data utilized in the perceptual visual examination for environmental observation. The findings of the study provide significant insights that can contribute to the enhancement of encryption methods utilized in GSM networks. This study enhances the comprehension of GSM security, although it is important to acknowledge the limits within the given model, which predominantly concentrate on the A5/1 algorithm. Subsequent inquiries may delve into the examination of additional encryption techniques and the pragmatic considerations associated with their implementation. In addition to the aspects mentioned above, future research must take into account the practical network conditions that exist in real-world scenarios, as well as the development of effective remedies to mitigate the risks posed by developing threats. This study highlights the significance of ongoing research in the realm of protecting wireless communication technology and proposes potential areas for further investigation in this ever-evolving domain. Real-time environmental monitoring could benefit from other encryption techniques beyond A5/1. Emerging threats and real-world network conditions must be considered through subsequent studies by examining and contributing to the enhancement of data security related to real-time data and environmental decision-making.
Future research work includes optimizing the design and placing additional LFSRs to balance and enhance the security and efficiency of the system. Furthermore, analysis will also be performed to assess the impact of the proposed encryption modifications on GSM protocol compatibility and performance. Additionally, experimental validation through hardware implementation and resistance testing against advanced cryptographic attacks will be essential to establish practical applicability.

Author Contributions

Conceptualization, F.A.; Methodology, F.A., R.K. and A.A.N.; Formal analysis, R.K.; Investigation, R.K.; Writing—original draft, R.K.; Writing—review and editing, R.K. and A.A.N.; Supervision, F.A. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The data will be made available by the authors on request.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

AMPSAdvanced Mobile Phone System
GSMGlobal System for Mobile
3GPP3rd Generation Partnership Project
UMTSUniversal Mobile Telecommunications System
SAGESecurity Algorithms Group of Experts
MSMobile Station
BTSBase Transceiver Station
VLRVisitor Location Register
SIMSubscriber Identity Module
SRESSigned Response
LFSRLinear Feedback Shift Register
D2DDevice-to-Device Communication

References

  1. Stuckmann, P. The GSM Evolution: Mobile Packet Data Services; John Wiley & Sons: Chichester, UK, 2002. [Google Scholar]
  2. Win, T.L.; Kyaw, N.C. Speech encryption and decryption using linear feedback shift register (LFSR). World Acad. Sci. Eng. Technol. 2008, 48, 463–467. [Google Scholar]
  3. Marconi, G. Radio telegraphy. J. Am. Inst. Electr. Eng. 1922, 41, 561–570. [Google Scholar] [CrossRef]
  4. Kumar, S. Wireless and Mobile Communication; New Age International (P) Limited Publishers: Kolkata, India, 2008; pp. 9–10. ISBN 978–81–224–2354-9. [Google Scholar]
  5. Young, W.R. Advanced mobile phone service: Introduction, background, and objectives. Bell Syst. Tech. J. 1979, 58, 1–14. [Google Scholar] [CrossRef]
  6. Farag, E.N.; Elmasry, M.I. Mixed Signal VLSI Wireless Design: Circuits and Systems; Springer Science & Business Media: New York, NY, USA, 2000. [Google Scholar]
  7. Lehpamer, H. Transmission Systems Design Handbook for Wireless Networks; Artech House: Norwood, MA, USA, 2002. [Google Scholar]
  8. Rappaport, T.S. Wireless Communications: Principles and Practice; Prentice Hall PTR: Upper Saddle River, NJ, USA, 1996. [Google Scholar]
  9. Varshney, U.; Vetter, R. Emerging mobile and wireless networks. Commun. ACM 2000, 43, 73–81. [Google Scholar] [CrossRef]
  10. Samukic, A. UMTS universal mobile telecommunications system: Development of standards for the third generation. IEEE Trans. Veh. Technol. 1998, 47, 1099–1104. [Google Scholar] [CrossRef]
  11. Tadayoni, R.; Henten, A.; Sørensen, J. Mobile communications–on standards, classifications and generations. Telecommun. Policy 2018, 42, 253–262. [Google Scholar] [CrossRef]
  12. Ahmad, F.; Mirza, M.Y.M.; Hussain, I.; Arshid, K. A Multi-Ray Channel Modelling Approach to Enhance UAV Communications in Networked Airspace. Inventions 2025, 10, 51. [Google Scholar] [CrossRef]
  13. Fauzi, S.Y.A.M.; Othman, M.; Shuib, F.M.M.; Seman, K. Hardware Implementation of Modified A5/1 Stream Cipher. Int. J. Comput. Theory Eng. 2017, 9, 4948–4950. [Google Scholar] [CrossRef]
  14. Zakaria, N.H.; Seman, K.; Abdullah, I. Modified A5/1 based stream cipher for secured GSM communication. Int. J. Comput. Sci. Netw. Secur. 2011, 11, 223–226. [Google Scholar]
  15. Bhal, S.; Dhillon, Z. LFSR based stream cipher (enhanced A5/1). Int. J. Comput. Appl. 2014, 57, 32–35. [Google Scholar]
  16. Fauzi, S.Y.A.M.; Othman, M.; Shuib, F.M.M.; Seman, K. Modified A5/1 stream cipher for secured global system for mobile (GSM) communication. In Proceedings of the 3rd International Conference on Artificial Intelligence and Computer Science (AICS2015), Penang, Malaysia, 12–13 October 2015; pp. 12–13. [Google Scholar]
  17. Fauzi, S.Y.A.M.; Othman, M.; Shuib, F.M.M.; Seman, K. Effect of the number of tapping bits of then A5/1 stream towards hardware performance. Sci. Int. 2017, 29, 75–79. [Google Scholar]
  18. Batina, L.; Kumar, S.; Lano, J.; Lemke, K.; Mentens, N.; Paar, C.; Verbauwhede, I. Testing framework for eSTREAM profile ii candidates. In Proceedings of the SASC 2006-Stream Ciphers Revisited, Leuven, Belgium, 2 February 2006; pp. 104–112. [Google Scholar]
  19. Mahalanobis, A.; Shah, J. An Improved Guess-and- Determine Attack on the A5/1 Stream Cipher. Comput. Inf. Sci. 2014, 7, 115–124. [Google Scholar]
  20. Kaur, R.; Bajaj, N. Enhancement in Feedback Polynomials of LFSR used in A5/1 Stream Cipher. Int. J. Comput. Appl. 2012, 57, 32–35. [Google Scholar]
  21. Madani, M.; Chitroub, S. Enhancement of A5/1 Stream Cipher Overcoming Its Weaknesses. In Proceedings of the Tenth International Conference on Wireless and Mobile Communications (ICWMC), Seville, Spain, 22–26 June 2014; pp. 154–159. [Google Scholar]
  22. Prajapat, R.P.; Bhadada, D.R.; Choudhary, A. Information Security Enhancement by Increasing Randomness of Stream Ciphers in GSM. Int. J. Adv. Comput. Sci. Appl. 2022, 13, 711–717. [Google Scholar] [CrossRef]
  23. Faquih, A.; Kadam, P.; Saquib, Z. Cryptographic techniques for wireless sensor networks: A survey. In Proceedings of the 2015 IEEE Bombay Section Symposium (IBSS), Mumbai, India, 10–11 September 2015. [Google Scholar]
  24. Prajapat, R.P. Rajesh Bhadada and Giriraj Sharma, Security Enhancement of A5/1 Stream Cipher in GSM Communication & its Randomness Analysis. In Proceedings of the 2021 IEEE 6th International Forum on Research and Technology for Society and Industry (RTSI), Naples, Italy, 6–9 September 2021. [Google Scholar]
  25. Sadkhan, S.B. A proposed Development of Clock Control Stream Cipher based on Suitable Attack. In Proceedings of the 2020 1st. Information Technology To Enhance e-learning and Other Application (IT-ELA), Baghdad, Iraq, 12–13 July 2020. [Google Scholar]
  26. Yerukala, N.; Prasad, V.K.; Apparao, A. Performance and Statistical Analysis of Stream Ciphers in GSM Communications. J. Commun. Softw. Syst. 2020, 16, 11–18. [Google Scholar] [CrossRef]
  27. Abbas, W.; Joshua, S.R.; Abbas, A.; Lee, J.-H. An end-to-end GSM/SMS encrypted approach for smartphone employing advanced encryption standard (AES). arXiv 2025, arXiv:2503.18859. [Google Scholar]
  28. Ahn, J.; Hussain, R.; Kang, K.; Son, J. Exploring Encryption Algorithms and Network Protocols: A Comprehensive Survey of Threats and Vulnerabilities. IEEE Commun. Surv. Tutor. 2025. [Google Scholar] [CrossRef]
  29. Chen, A.C.H. Evaluation of advanced encryption standard algorithms for image encryption. In Proceedings of the 2024 International Conference on Smart Systems for Applications in Electrical Sciences (ICSSES), Tumakuru, India, 3–4 May 2024. [Google Scholar]
  30. Islam, S.A.; MohanKumar, M.; Jannat, U.K. Enhancing data security in mobile traffic networks through reverse engineering. In Proceedings of the 2024 4th International Conference on Ubiquitous Computing and Intelligent Information Systems (ICUIS), Gobichettipalayam, India, 12–13 December 2024; pp. 1408–1416. [Google Scholar]
  31. Khan, M.A.; Aman, M.N.; Sikdar, B. Qusim-enhanced GSM security: A quantum prover authentication protocol (QUPAP) for mobile communication. IEEE Internet Things J. 2025, 12, 23036–23060. [Google Scholar] [CrossRef]
  32. Sombo, B.; Apeh, S.T.; Edeoghon, I.A. Review on authentication algorithms in cellular communication networks. Cloud Comput. Data Sci. 2025, 6, 54–66. [Google Scholar]
  33. Butun, I.; Österberg, P.; Song, H. Security of the Internet of Things: Vulnerabilities, attacks, and countermeasures. IEEE Commun. Surv. Tutor. 2019, 22, 616–644. [Google Scholar] [CrossRef]
  34. Hazra, R.; Chatterjee, P.; Singh, Y.; Podder, G.; Das, T. Data encryption and secure communication protocols. In Strategies for E-Commerce Data Security: Cloud, Blockchain, AI, and Machine Learning; IGI Global: Hershey, PA, USA, 2024; pp. 546–570. [Google Scholar]
  35. Drăgușin, S.-A.; Bizon, N.; Boștinaru, R.-N.; Enescu, F.-M.; Teodorescu, R.-M.; Săvulescu, C. Analysis of vulnerabilities in communication channels using an integrated approach based on machine learning and statistical methods. In Proceedings of the 2024 16th International Conference on Electronics, Computers and Artificial Intelligence (ECAI), Iasi, Romania, 27–28 June 2024; pp. 1–12. [Google Scholar]
  36. Joarder, Y.; Fung, C. Exploring QUIC security and privacy: A comprehensive survey on QUIC security and privacy vulnerabilities, threats, attacks and future research directions. IEEE Trans. Netw. Serv. Manag. 2024, 21, 6953–6973. [Google Scholar] [CrossRef]
  37. Rupprecht, D.; Dabrowski, A.; Holz, T.; Weippl, E.; Popper, C. On security research towards future mobile network generations. IEEE Commun. Surv. Tutor. 2018, 20, 2518–2542. [Google Scholar] [CrossRef]
  38. Raheem, A. An Investigation into Authentication Security of GSM Algorithm for Mobile Banking; Anchor Academic Publishing: Hamburg, Germany, 2013. [Google Scholar]
  39. Gong, P.; Chen, T.M.; Xu, Q. An energy efficient trust-aware routing protocol for wireless sensor net-works. J. Sens. 2015, 2015, 469793. [Google Scholar] [CrossRef]
  40. Alrajeh, N.A.; Khan, S.; Lloret, J.; Loo, J. Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks. Int. J. Distrib. Sens. Netw. 2013, 9, 374796. [Google Scholar] [CrossRef]
  41. Rhee, M.Y. Mobile Communication Systems and Security; John Wiley & Sons: Hoboken, NJ, USA, 2009. [Google Scholar]
  42. Pannu, M.; Bird, R.; Gill, B.; Patel, K. Investigating vulnerabilities in GSM security. In Proceedings of the International Conference and Workshop on Computing and Communication (IEMCON), Vancouver, BC, Canada, 15–17 October 2015; pp. 1–7. [Google Scholar]
  43. Khan, M.S.; Khan, N.M. Low complexity signed response based sybil attack detection mechanism in wireless sensor networks. J. Sens. 2016, 2016, 9783072. [Google Scholar]
  44. Goli, J.D. Cryptanalysis of alleged A5 stream cipher. In International Conference on the Theory and Applications of Cryptographic Techniques 1233; Springer: Berlin/Heidelberg, Germany, 1997; pp. 239–255. [Google Scholar]
  45. Biryukov, A.; Shamir, A.; Wagner, D. Real time cryptanalysis of A5/1 on a pc. In International Workshop on Fast Software Encryption 1978; Springer: Berlin/Heidelberg, Germany, 2000; pp. 1–18. [Google Scholar]
  46. Khan, M.S.; Khan, N.M.; Khan, A.; Aadil, F.; Tahir, M.; Sardaraz, M. A low-complexity, energy-efficient data securing model for wireless sensor network based on linearly complex voice encryption mechanism of GSM technology. Int. J. Distrib. Sens. Netw. 2021, 17, 15501477211018623. [Google Scholar] [CrossRef]
  47. Waheed, A.; Umar, A.I.; Zareei, M.; Din, N.; Amin, N.U.; Iqbal, J.; Saeed, Y.; Mohamed, E.M. Cryptanalysis and improvement of a proxy signcryption scheme in the standard computational model. IEEE Access 2020, 8, 131188–131201. [Google Scholar] [CrossRef]
  48. Global System for Mobile. Available online: www.gsma.com (accessed on 2 February 2019).
  49. Nm, K.; Khalid, Z.; Ahmed, G. Gradient cost establishment (GRACE) for an energy-aware routing in wireless sensor networks. EURASIP J. Wirel. Commun. Netw. 2009, 15, 275694. [Google Scholar]
  50. Goli, J.D. On the security of shift register based keystream generators. In International Workshop on Fast Software Encryption 809; Springer: Berlin/Heidelberg, Germany, 1993; pp. 90–100. [Google Scholar]
  51. Barkan, E.; Biham, E.; Keller, N. Instant cipher text only cryptanalysis of GSM encrypted communication. J. Cryptol. 2008, 21, 392–429. [Google Scholar] [CrossRef]
  52. Jayasinghe, D.; Ignjatovic, A.; Parameswaran, S. SCRIP: Secure Random Clock Execution on Soft Processor Systems to Mitigate Power-based Side Channel Attacks. In Proceedings of the IEEE/ACM International Conference on Computer-Aided Design (ICCAD), Westminster, CO, USA, 4–7 November 2019; pp. 1–7. [Google Scholar]
Figure 1. Workflow of the SAGE algorithm illustrating the main processing stages for secure authentication.
Figure 1. Workflow of the SAGE algorithm illustrating the main processing stages for secure authentication.
Inventions 10 00056 g001
Figure 2. Block diagram illustrating the workflow of the A3 algorithm for 32-bit output generation.
Figure 2. Block diagram illustrating the workflow of the A3 algorithm for 32-bit output generation.
Inventions 10 00056 g002
Figure 3. A5/1 stream cipher.
Figure 3. A5/1 stream cipher.
Inventions 10 00056 g003
Figure 4. Workflow of the A5/1 stream cipher illustrating key generation and keystream production.
Figure 4. Workflow of the A5/1 stream cipher illustrating key generation and keystream production.
Inventions 10 00056 g004
Figure 5. Architecture of the A5/1 stream cipher showing three irregularly clocked linear feedback shift registers (LFSRs) used for keystream generation.
Figure 5. Architecture of the A5/1 stream cipher showing three irregularly clocked linear feedback shift registers (LFSRs) used for keystream generation.
Inventions 10 00056 g005
Figure 6. Operational dynamics of the majority function using three 8-bit Linear Feedback Shift Registers (LFSRs).
Figure 6. Operational dynamics of the majority function using three 8-bit Linear Feedback Shift Registers (LFSRs).
Inventions 10 00056 g006
Figure 7. Linear feedback shift registers (LFSR).
Figure 7. Linear feedback shift registers (LFSR).
Inventions 10 00056 g007
Figure 8. Diagram of LFSR.
Figure 8. Diagram of LFSR.
Inventions 10 00056 g008
Figure 9. Possible register combinations for a fixed session key length.
Figure 9. Possible register combinations for a fixed session key length.
Inventions 10 00056 g009
Figure 10. All registers (LFSR).
Figure 10. All registers (LFSR).
Inventions 10 00056 g010
Figure 11. Correlation between the number of registers and vulnerability level of interception.
Figure 11. Correlation between the number of registers and vulnerability level of interception.
Inventions 10 00056 g011
Figure 12. Vulnerability level of interception and number of combinations versus session key.
Figure 12. Vulnerability level of interception and number of combinations versus session key.
Inventions 10 00056 g012
Figure 13. Possible number of combinations.
Figure 13. Possible number of combinations.
Inventions 10 00056 g013
Figure 14. Number of registers. (a) Combinations vs. registers; (b) vulnerability level vs. registers.
Figure 14. Number of registers. (a) Combinations vs. registers; (b) vulnerability level vs. registers.
Inventions 10 00056 g014
Figure 15. Histogram of registers. (a) Combinations vs. registers (b) vulnerability level vs. registers.
Figure 15. Histogram of registers. (a) Combinations vs. registers (b) vulnerability level vs. registers.
Inventions 10 00056 g015
Table 2. Number of possible combinations for each register group configuration.
Table 2. Number of possible combinations for each register group configuration.
D = 3n = 8Number of combinations are = 6
D = 3n = 16Number of combinations are = 66
D = 5n = 16Number of combinations are = 210
D = 7n = 16Number of combinations are = 27
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Ahmad, F.; Khan, R.; Nkembi, A.A. Improvement in the Interception Vulnerability Level of Encryption Mechanism in GSM. Inventions 2025, 10, 56. https://doi.org/10.3390/inventions10040056

AMA Style

Ahmad F, Khan R, Nkembi AA. Improvement in the Interception Vulnerability Level of Encryption Mechanism in GSM. Inventions. 2025; 10(4):56. https://doi.org/10.3390/inventions10040056

Chicago/Turabian Style

Ahmad, Fawad, Reshail Khan, and Armel Asongu Nkembi. 2025. "Improvement in the Interception Vulnerability Level of Encryption Mechanism in GSM" Inventions 10, no. 4: 56. https://doi.org/10.3390/inventions10040056

APA Style

Ahmad, F., Khan, R., & Nkembi, A. A. (2025). Improvement in the Interception Vulnerability Level of Encryption Mechanism in GSM. Inventions, 10(4), 56. https://doi.org/10.3390/inventions10040056

Article Metrics

Back to TopTop