Abstract of "Security Algorithms for Mobile Telephony"
- Quick overview of cryptography in GSM and 3G — where it fits in
- A bit of context, particularly historical and political, about the development of GSM security … and how things have changed
- Some "real life" comments about COMP128, A5/1, A5/2 etc — what I believe the effects of the cryptanalysis are in practice
- The development of new algorithms for 3G —
part crypto theory, part case study of algorithm development for a real
life industry application
Note: Subject to change!