11,773 research outputs found
Eavesdropping on GSM: state-of-affairs
In the almost 20 years since GSM was deployed several security problems have
been found, both in the protocols and in the - originally secret -
cryptography. However, practical exploits of these weaknesses are complicated
because of all the signal processing involved and have not been seen much
outside of their use by law enforcement agencies.
This could change due to recently developed open-source equipment and
software that can capture and digitize signals from the GSM frequencies. This
might make practical attacks against GSM much simpler to perform.
Indeed, several claims have recently appeared in the media on successfully
eavesdropping on GSM. When looking at these claims in depth the conclusion is
often that more is claimed than what they are actually capable of. However, it
is undeniable that these claims herald the possibilities to eavesdrop on GSM
using publicly available equipment.
This paper evaluates the claims and practical possibilities when it comes to
eavesdropping on GSM, using relatively cheap hardware and open source
initiatives which have generated many headlines over the past year. The basis
of the paper is extensive experiments with the USRP (Universal Software Radio
Peripheral) and software projects for this hardware.Comment: 5th Benelux Workshop on Information and System Security (WISSec
2010), November 201
On the type and the standardform of induced UA representations
We derive to which of the three types an irreducible UA representation which is obtained with the procedure of generalised induction belongs. We analyse the question whether or not the irreducible induced UA representations are on standardform. The results hold as well for induced PUA representations
On the determination of factor systems of PUA representations
A method is developed to obtain a complete set of inequivalent factor systems of PUA � representations of a group with a subgroup of index two from the factor systems of this subgroup
Twistor space, Minkowski space and the conformal group
It is shown that the conformal group of compactified Minkowski space is isomorphic to a group of rays of semilinear transformations of twistor space. The action of the conformal group on twistor space is given by an explicit realisation of this isomorphism. In this way we determine the transformation of twistor space under space inversion and time inversion
Multiconditional Approximate Reasoning with Continuous Piecewise Linear Membership Functions
It is shown that, for some intersection and implication functions, an exact and efficient algorithm exists for the computation of inference results in multiconditional approximate reasoning on domains which are finite intervals of the real numbers, when membership functions are restricted to functions which are continuous and piecewise linear. An implementation of the algorithm is given in the functional programming language Miranda
On the factor systems of the Shubnikov space groups
The procedure of Backhouse for the determination of a complete set of inequivalent factor systems of the symmorphic Shubnikov space groups of type I is generalized for all Shubnikov space groups of types I and 111. The results are used to obtain a method for the construction of a set of inequivalent factor systems of the Shubnikov space groups of types I1 and IV
Efficient algorithms for approximate reasoning
We present algorithms for approximate reasoning computations, for some intersection and implication functions, which are as efficient as E.H. Mamdani et al.'s (1975) interpolation method. Implementations of the algorithms are given in the functional language Mirand
Induced PUA representations and selection rules
Well known properties of induced unitary representations are generalised for induced PUA representations. They are applied to obtain an expression for the multiplicities in the Clebsch-Gordon series of induced PUA representations. Finally we show how these multiplicities can be used for the determination of selection rules
Static Analysis of Functional Programs
In this paper, the static analysis of programs in the functional programming language Miranda* is described based on two graph models. A new control-flow graph model of Miranda definitions is presented, and a model with four classes of callgraphs. Standard software metrics are applicable to these models. A Miranda front end for Prometrix, ¿, a tool for the automated analysis of flowgraphs and callgraphs, has been developed. This front end produces the flowgraph and callgraph representations of Miranda programs. Some features of the metric analyser are illustrated with an example program. The tool provides a promising access to standard metrics on functional programs
- …