SlideShare a Scribd company logo
1 of 20
GSM Security Overview
                            By,
                               Pruthwin. K.G
                               1PI07EC070
Under the supervision of,
 Ms.Soumya Pattar


                                               1
GSM Architecture
Mobile Stations   Base Station            Network     Subscriber and terminal
                   Subsystem             Management    equipment databases

                                            OMC
                  BTS
                                       Exchange
                                        System
                                                           VLR
                  BTS            BSC        MSC
                                                           HLR       AUC

                  BTS                                      EIR

                                                                        2
GSM Security Concerns
Operators

    Bills right people
   Avoid fraud
   Protect Services
Customers
   Privacy
   Anonymity


                             3
GSM Security Design
            Requirements
The security mechanism
   MUST NOT
      Add significant overhead on call set up
      Increase bandwidth of the channel
      Increase error rate
      Add expensive complexity to the system

    MUST
      Cost effective scheme
   Define security procedures
      Generation and distribution of keys
      Exchange information between operators
      Confidentiality of algorithms

                                                4
GSM Security Features
Key management is independent of equipment

    Subscribers can change handsets without compromising
    security
Subscriber identity protection

    not easy to identify the user of the system intercepting a user
    data
Detection of compromised equipment

    Detection mechanism whether a mobile device was
    compromised or not
Subscriber authentication
   The operator knows for billing purposes who is using the system
Signaling and user data protection

    Signaling and data channels are protected over the radio path

                                                                      5
GSM Mobile Station
Mobile Station

    Mobile Equipment (ME)
       Physical mobile device
       Identifiers
            IMEI – International Mobile Equipment Identity

    Subscriber Identity Module (SIM)
       Smart Card containing keys, identifiers and algorithms
       Identifiers
            Ki – Subscriber Authentication Key
            IMSI – International Mobile Subscriber Identity
            TMSI – Temporary Mobile Subscriber Identity
            PIN – Personal Identity Number protecting a SIM
            LAI – location area identity




                                                                6
Subscriber Identity Protection
TMSI – Temporary Mobile Subscriber Identity

    Goals
       TMSI is used instead of IMSI as an a temporary subscriber identifier
       TMSI prevents an eavesdropper from identifying of subscriber

    Usage
       TMSI is assigned when IMSI is transmitted to AuC on the first phone
       switch on
       Every time a location update (new MSC) occur the networks assigns
        a new TMSI
       TMSI is used by the MS to report to the network or during a call
       initialization
       Network uses TMSI to communicate with MS
       On MS switch off TMSI is stored on SIM card to be reused next time

    The Visitor Location Register (VLR) performs assignment,
    administration and update of the TMSI

                                                                          7
Key Management Scheme
Ki – Subscriber Authentication Key

    Shared 128 bit key used for authentication of subscriber by
    the operator
   Key Storage
       Subscriber’s SIM (owned by operator, i.e. trusted)
       Operator’s Home Locator Register (HLR) of the subscriber’s
       home network
SIM can be used with different equipment




                                                                    8
Detection of Compromised
              Equipment
International Mobile Equipment Identifier (IMEI)

    Identifier allowing to identify mobiles

    IMEI is independent of SIM

    Used to identify stolen or compromised equipment
Equipment Identity Register (EIR)
   Black list – stolen or non-type mobiles
   White list - valid mobiles
   Gray list – local tracking mobiles
Central Equipment Identity Register (CEIR)

    Approved mobile type (type approval authorities)

    Consolidated black list (posted by operators)

                                                       9
Authentication and Encryption
                 Scheme
  Mobile Station            Radio Link                  GSM Operator

                           Challenge RAND
SIM
  Ki                                                                   Ki
              A3                                            A3
                        Signed response (SRES)
       SRES                                                     SRES

              A8             Authentication: are SRES       A8
                                  values equal?
                   Kc                                      Kc

  mi                       Encrypted Data                          mi
              A5                                            A5



                                                                       10
A3 – MS Authentication Algorithm
Goal

    Generation of SRES response to MSC’s
    random challenge RAND

                      RAND (128 bit)



       Ki (128 bit)        A3



                       SRES (32 bit)


                                           11
A8 – Voice Privacy Key Generation
            Algorithm
 Goal
    Generation of session key Kc
       A8 specification was never made public

                       RAND (128 bit)



        Ki (128 bit)         A8



                         KC (64 bit)


                                                12
Logical Implementation
            of A3 and A8
Both A3 and A8 algorithms are
implemented on the SIM
   Operator can decide, which algorithm to use.
   Algorithms implementation is independent of
    hardware manufacturers and network
    operators.




                                                   13
Logical Implementation
            of A3 and A8
COMP128 is used for both A3 and A8 in
most GSM networks.
   COMP128 is a keyed hash function

                          RAND (128 bit)



       Ki (128 bit)          COMP128



                           128 bit output
                      SRES 32 bit and Kc 54 bit
                                                  14
A5 – Encryption Algorithm
   A5 is a stream cipher
      Implemented very efficiently on hardware
      Design was never made public
      Leaked to Ross Anderson and Bruce Schneier
   Variants
      A5/1 – the strong version
      A5/2 – the weak version
      A5/3
          GSM Association Security Group and 3GPP design
          Based on Kasumi algorithm used in 3G mobile systems

                                                                 15
A5 Encryption
Mobile Stations   Base Station            Network     Subscriber and terminal
                   Subsystem             Management    equipment databases

                                            OMC
                  BTS
                                       Exchange
                                        System
                                                           VLR
                  BTS            BSC        MSC
                                                           HLR       AUC

                  BTS                                      EIR

      A5 Encryption
                                                                       16
Attack History
1991
   First GSM implementation.
April 1998

    The Smartcard Developer Association (SDA) together with U.C.
    Berkeley researches cracked the COMP128 algorithm stored in SIM and
    succeeded to get Ki within several hours. They discovered that Kc uses
    only 54 bits.
August 1999
   The week A5/2 was cracked using a single PC within seconds.
December 1999
   Alex Biryukov, Adi Shamir and David Wagner have published the
    scheme breaking the strong A5/1 algorithm. Within two minutes of
    intercepted call the attack time was only 1 second.
May 2002
   The IBM Research group discovered a new way to quickly extract the
    COMP128 keys using side channels.


                                                                         17
Possible improvement
Use another cryptographically secure
algorithm for A3.
The operator can employ a new A5
implementation with strong encryption too.
A new A5/3 algorithm has also been agreed upon to replace the aging A5/2
algorithm.

Third solution would be to encrypt the
traffic on the operator’s backbone network
between the network components.

                                                                       18
Conclusion
GSM is the dominant cellular technology
today.
Main reason for GSM to become is that
some of the algorithms and specifications
were leaked out and studied and some
critical errors were found.
However, the security can be improved in
some areas with relatively simple
measures.
                                            19
THANK YOU



            20

More Related Content

What's hot (20)

Unit 2 : common cellular system PPT
Unit 2 : common cellular system PPTUnit 2 : common cellular system PPT
Unit 2 : common cellular system PPT
 
GSM Architecture
GSM ArchitectureGSM Architecture
GSM Architecture
 
UMTS, Introduction.
UMTS, Introduction.UMTS, Introduction.
UMTS, Introduction.
 
LTE Architecture
LTE ArchitectureLTE Architecture
LTE Architecture
 
GSM & UMTS Security
GSM & UMTS SecurityGSM & UMTS Security
GSM & UMTS Security
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALAGSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
GSM SECURITY AND ENCRYPTION BY SAIKIRAN PANJALA
 
wireless sensor network ppt
wireless sensor network pptwireless sensor network ppt
wireless sensor network ppt
 
Ppt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th semPpt on low power wireless sensor network 5th sem
Ppt on low power wireless sensor network 5th sem
 
GSM channels
GSM channelsGSM channels
GSM channels
 
Handoff
HandoffHandoff
Handoff
 
GSM Air Interface
GSM Air Interface GSM Air Interface
GSM Air Interface
 
IP Security
IP SecurityIP Security
IP Security
 
Routing protocols in ad hoc network
Routing protocols in ad hoc networkRouting protocols in ad hoc network
Routing protocols in ad hoc network
 
BLAST
BLASTBLAST
BLAST
 
GSM architecture
GSM architectureGSM architecture
GSM architecture
 
IS-95 Cdma
IS-95 CdmaIS-95 Cdma
IS-95 Cdma
 
Cellular concept in mobile communication
Cellular concept in mobile communicationCellular concept in mobile communication
Cellular concept in mobile communication
 
Call flow in gsm
Call flow in gsmCall flow in gsm
Call flow in gsm
 
Channel coding
Channel coding  Channel coding
Channel coding
 

Viewers also liked

Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryptionjyothsnapaidi
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....pptbalu008
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaOWASP Delhi
 
Alternate Energy Sources-solar energy abstract
Alternate Energy Sources-solar energy abstractAlternate Energy Sources-solar energy abstract
Alternate Energy Sources-solar energy abstractEr. Pavan Kumar Maganti
 
gsm home security system absract
gsm home security system absractgsm home security system absract
gsm home security system absractnidhipareek96
 
Module securite
Module securiteModule securite
Module securiteKaes1337
 
DISY.BE Conférence de Presse
DISY.BE Conférence de PresseDISY.BE Conférence de Presse
DISY.BE Conférence de PresseHubert DEKOCK
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionLuca Bongiorni
 
5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security7wounders
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security systemNIT srinagar
 
Strategyzing big data in telco industry
Strategyzing big data in telco industryStrategyzing big data in telco industry
Strategyzing big data in telco industryParviz Iskhakov
 
LPG Gas detector
LPG Gas detectorLPG Gas detector
LPG Gas detectorajay singh
 
Gsm based home security system
Gsm based home security systemGsm based home security system
Gsm based home security systemNarayan Gour
 
Project presentation on wireless lpg leakage detector
Project presentation on wireless lpg leakage detectorProject presentation on wireless lpg leakage detector
Project presentation on wireless lpg leakage detectorPETER ASIGRI
 
Architecture d'un réseau GSM 2G (Téléphonie Mobile)
Architecture d'un réseau GSM 2G (Téléphonie Mobile)Architecture d'un réseau GSM 2G (Téléphonie Mobile)
Architecture d'un réseau GSM 2G (Téléphonie Mobile)Assia Mounir
 

Viewers also liked (19)

GSM Security
GSM SecurityGSM Security
GSM Security
 
Gsm security and encryption
Gsm security and encryptionGsm security and encryption
Gsm security and encryption
 
Gsm security final
Gsm security finalGsm security final
Gsm security final
 
Gsm.....ppt
Gsm.....pptGsm.....ppt
Gsm.....ppt
 
Cryptography in GSM
Cryptography in GSMCryptography in GSM
Cryptography in GSM
 
GSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj VermaGSM Security 101 by Sushil Singh and Dheeraj Verma
GSM Security 101 by Sushil Singh and Dheeraj Verma
 
Alternate Energy Sources-solar energy abstract
Alternate Energy Sources-solar energy abstractAlternate Energy Sources-solar energy abstract
Alternate Energy Sources-solar energy abstract
 
gsm home security system absract
gsm home security system absractgsm home security system absract
gsm home security system absract
 
Module securite
Module securiteModule securite
Module securite
 
DISY.BE Conférence de Presse
DISY.BE Conférence de PresseDISY.BE Conférence de Presse
DISY.BE Conférence de Presse
 
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil ProtectionOpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
OpenBTS: Emergency GSM Messaging & Monitoring System for Civil Protection
 
5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security
 
Report on Embedded Based Home security system
Report on Embedded Based Home security systemReport on Embedded Based Home security system
Report on Embedded Based Home security system
 
Strategyzing big data in telco industry
Strategyzing big data in telco industryStrategyzing big data in telco industry
Strategyzing big data in telco industry
 
LPG Gas detector
LPG Gas detectorLPG Gas detector
LPG Gas detector
 
Gsm based home security system
Gsm based home security systemGsm based home security system
Gsm based home security system
 
Project presentation on wireless lpg leakage detector
Project presentation on wireless lpg leakage detectorProject presentation on wireless lpg leakage detector
Project presentation on wireless lpg leakage detector
 
TEMS PARAMETERS
TEMS PARAMETERSTEMS PARAMETERS
TEMS PARAMETERS
 
Architecture d'un réseau GSM 2G (Téléphonie Mobile)
Architecture d'un réseau GSM 2G (Téléphonie Mobile)Architecture d'un réseau GSM 2G (Téléphonie Mobile)
Architecture d'un réseau GSM 2G (Téléphonie Mobile)
 

Similar to Gsm security

Gsm security
Gsm securityGsm security
Gsm securitymaicuong8
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular SystemsACMBangalore
 
Rk 3 gsm network
Rk 3 gsm networkRk 3 gsm network
Rk 3 gsm networkAzri Randy
 
This chapter gives an outline of the security.
This chapter gives an outline of the security.This chapter gives an outline of the security.
This chapter gives an outline of the security.RoshniIsrani1
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Gsm review note by zemaryali
Gsm review note by zemaryaliGsm review note by zemaryali
Gsm review note by zemaryaliZaryal Social
 
GSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesGSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesEngr.MEESHU SHARKER
 
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core NetworkHamidreza Bolhasani
 
System Introduction
System IntroductionSystem Introduction
System IntroductionSokunth Che
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecturesumit singh
 

Similar to Gsm security (20)

Final gsm1
Final gsm1Final gsm1
Final gsm1
 
Gsm security
Gsm securityGsm security
Gsm security
 
Securing Wireless Cellular Systems
Securing Wireless Cellular SystemsSecuring Wireless Cellular Systems
Securing Wireless Cellular Systems
 
Presentation one-gsm
Presentation one-gsmPresentation one-gsm
Presentation one-gsm
 
Security Issues Implement GSM.pptx
Security Issues Implement GSM.pptxSecurity Issues Implement GSM.pptx
Security Issues Implement GSM.pptx
 
Switching systems lecture7
Switching  systems lecture7Switching  systems lecture7
Switching systems lecture7
 
Rk 3 gsm network
Rk 3 gsm networkRk 3 gsm network
Rk 3 gsm network
 
Rk 3 gsm network @guddu
Rk 3 gsm network @gudduRk 3 gsm network @guddu
Rk 3 gsm network @guddu
 
This chapter gives an outline of the security.
This chapter gives an outline of the security.This chapter gives an outline of the security.
This chapter gives an outline of the security.
 
Security model evaluation of 3 g
Security  model  evaluation  of  3 gSecurity  model  evaluation  of  3 g
Security model evaluation of 3 g
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
GSM Architecture.ppt
 GSM Architecture.ppt GSM Architecture.ppt
GSM Architecture.ppt
 
Gsm review note by zemaryali
Gsm review note by zemaryaliGsm review note by zemaryali
Gsm review note by zemaryali
 
GSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE TechnologiesGSM security solution by FINETUNE Technologies
GSM security solution by FINETUNE Technologies
 
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
2G / 3G / 4G / IMS / 5G Overview with Focus on Core Network
 
GSM Presentation
GSM PresentationGSM Presentation
GSM Presentation
 
Mob. comp . prst
Mob. comp . prstMob. comp . prst
Mob. comp . prst
 
System Introduction
System IntroductionSystem Introduction
System Introduction
 
Gsm Srsly (Shmoocon)
Gsm  Srsly (Shmoocon)Gsm  Srsly (Shmoocon)
Gsm Srsly (Shmoocon)
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 

More from Ali Kamil

Network security
Network securityNetwork security
Network securityAli Kamil
 
Compare gsm cdma
Compare gsm cdmaCompare gsm cdma
Compare gsm cdmaAli Kamil
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1Ali Kamil
 
communication-protocols
 communication-protocols communication-protocols
communication-protocolsAli Kamil
 

More from Ali Kamil (6)

Network security
Network securityNetwork security
Network security
 
Wi max
Wi maxWi max
Wi max
 
Lte course
Lte courseLte course
Lte course
 
Compare gsm cdma
Compare gsm cdmaCompare gsm cdma
Compare gsm cdma
 
Exploration network chapter1
Exploration network chapter1Exploration network chapter1
Exploration network chapter1
 
communication-protocols
 communication-protocols communication-protocols
communication-protocols
 

Gsm security

  • 1. GSM Security Overview By, Pruthwin. K.G 1PI07EC070 Under the supervision of, Ms.Soumya Pattar 1
  • 2. GSM Architecture Mobile Stations Base Station Network Subscriber and terminal Subsystem Management equipment databases OMC BTS Exchange System VLR BTS BSC MSC HLR AUC BTS EIR 2
  • 3. GSM Security Concerns Operators  Bills right people  Avoid fraud  Protect Services Customers  Privacy  Anonymity 3
  • 4. GSM Security Design Requirements The security mechanism  MUST NOT Add significant overhead on call set up Increase bandwidth of the channel Increase error rate Add expensive complexity to the system  MUST Cost effective scheme  Define security procedures Generation and distribution of keys Exchange information between operators Confidentiality of algorithms 4
  • 5. GSM Security Features Key management is independent of equipment  Subscribers can change handsets without compromising security Subscriber identity protection  not easy to identify the user of the system intercepting a user data Detection of compromised equipment  Detection mechanism whether a mobile device was compromised or not Subscriber authentication  The operator knows for billing purposes who is using the system Signaling and user data protection  Signaling and data channels are protected over the radio path 5
  • 6. GSM Mobile Station Mobile Station  Mobile Equipment (ME) Physical mobile device Identifiers  IMEI – International Mobile Equipment Identity  Subscriber Identity Module (SIM) Smart Card containing keys, identifiers and algorithms Identifiers  Ki – Subscriber Authentication Key  IMSI – International Mobile Subscriber Identity  TMSI – Temporary Mobile Subscriber Identity  PIN – Personal Identity Number protecting a SIM  LAI – location area identity 6
  • 7. Subscriber Identity Protection TMSI – Temporary Mobile Subscriber Identity  Goals TMSI is used instead of IMSI as an a temporary subscriber identifier TMSI prevents an eavesdropper from identifying of subscriber  Usage TMSI is assigned when IMSI is transmitted to AuC on the first phone switch on Every time a location update (new MSC) occur the networks assigns a new TMSI TMSI is used by the MS to report to the network or during a call initialization Network uses TMSI to communicate with MS On MS switch off TMSI is stored on SIM card to be reused next time  The Visitor Location Register (VLR) performs assignment, administration and update of the TMSI 7
  • 8. Key Management Scheme Ki – Subscriber Authentication Key  Shared 128 bit key used for authentication of subscriber by the operator  Key Storage Subscriber’s SIM (owned by operator, i.e. trusted) Operator’s Home Locator Register (HLR) of the subscriber’s home network SIM can be used with different equipment 8
  • 9. Detection of Compromised Equipment International Mobile Equipment Identifier (IMEI)  Identifier allowing to identify mobiles  IMEI is independent of SIM  Used to identify stolen or compromised equipment Equipment Identity Register (EIR)  Black list – stolen or non-type mobiles  White list - valid mobiles  Gray list – local tracking mobiles Central Equipment Identity Register (CEIR)  Approved mobile type (type approval authorities)  Consolidated black list (posted by operators) 9
  • 10. Authentication and Encryption Scheme Mobile Station Radio Link GSM Operator Challenge RAND SIM Ki Ki A3 A3 Signed response (SRES) SRES SRES A8 Authentication: are SRES A8 values equal? Kc Kc mi Encrypted Data mi A5 A5 10
  • 11. A3 – MS Authentication Algorithm Goal  Generation of SRES response to MSC’s random challenge RAND RAND (128 bit) Ki (128 bit) A3 SRES (32 bit) 11
  • 12. A8 – Voice Privacy Key Generation Algorithm Goal  Generation of session key Kc A8 specification was never made public RAND (128 bit) Ki (128 bit) A8 KC (64 bit) 12
  • 13. Logical Implementation of A3 and A8 Both A3 and A8 algorithms are implemented on the SIM  Operator can decide, which algorithm to use.  Algorithms implementation is independent of hardware manufacturers and network operators. 13
  • 14. Logical Implementation of A3 and A8 COMP128 is used for both A3 and A8 in most GSM networks.  COMP128 is a keyed hash function RAND (128 bit) Ki (128 bit) COMP128 128 bit output SRES 32 bit and Kc 54 bit 14
  • 15. A5 – Encryption Algorithm  A5 is a stream cipher Implemented very efficiently on hardware Design was never made public Leaked to Ross Anderson and Bruce Schneier  Variants A5/1 – the strong version A5/2 – the weak version A5/3  GSM Association Security Group and 3GPP design  Based on Kasumi algorithm used in 3G mobile systems 15
  • 16. A5 Encryption Mobile Stations Base Station Network Subscriber and terminal Subsystem Management equipment databases OMC BTS Exchange System VLR BTS BSC MSC HLR AUC BTS EIR A5 Encryption 16
  • 17. Attack History 1991  First GSM implementation. April 1998  The Smartcard Developer Association (SDA) together with U.C. Berkeley researches cracked the COMP128 algorithm stored in SIM and succeeded to get Ki within several hours. They discovered that Kc uses only 54 bits. August 1999  The week A5/2 was cracked using a single PC within seconds. December 1999  Alex Biryukov, Adi Shamir and David Wagner have published the scheme breaking the strong A5/1 algorithm. Within two minutes of intercepted call the attack time was only 1 second. May 2002  The IBM Research group discovered a new way to quickly extract the COMP128 keys using side channels. 17
  • 18. Possible improvement Use another cryptographically secure algorithm for A3. The operator can employ a new A5 implementation with strong encryption too. A new A5/3 algorithm has also been agreed upon to replace the aging A5/2 algorithm. Third solution would be to encrypt the traffic on the operator’s backbone network between the network components. 18
  • 19. Conclusion GSM is the dominant cellular technology today. Main reason for GSM to become is that some of the algorithms and specifications were leaked out and studied and some critical errors were found. However, the security can be improved in some areas with relatively simple measures. 19
  • 20. THANK YOU 20