<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2021-6-2-0-2</article-id><article-id pub-id-type="publisher-id">2462</article-id><article-categories><subj-group subj-group-type="heading"><subject>INFORMATION SYSTEM AND TECHNOLOGIES</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;RESEARCH OF SPEECH ENCRYPTION RELIABILITY IN GSM MOBILE COMMUNICATION TECHNOLOGY&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;RESEARCH OF SPEECH ENCRYPTION RELIABILITY IN GSM MOBILE COMMUNICATION TECHNOLOGY&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Bukhantsov</surname><given-names>Andrey Dmitrievich</given-names></name><name xml:lang="en"><surname>Bukhantsov</surname><given-names>Andrey Dmitrievich</given-names></name></name-alternatives><email>bukhantsov@bsu.edu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Sajiid</surname><given-names>Alexander Yuryevich</given-names></name><name xml:lang="en"><surname>Sajiid</surname><given-names>Alexander Yuryevich</given-names></name></name-alternatives><email>1275117@bsu.edu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Ustinov</surname><given-names>Alexey Nikolaevich</given-names></name><name xml:lang="en"><surname>Ustinov</surname><given-names>Alexey Nikolaevich</given-names></name></name-alternatives><email>1319385@bsu.edu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Rodionov</surname><given-names>Sergey Viktorovich</given-names></name><name xml:lang="en"><surname>Rodionov</surname><given-names>Sergey Viktorovich</given-names></name></name-alternatives><email>rodionov.serhii@kart.edu.ua</email></contrib></contrib-group><pub-date pub-type="epub"><year>2021</year></pub-date><volume>6</volume><issue>2</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2021/2/ИТ_НР_6-2_2_ZqpAGFe.pdf" /><abstract xml:lang="ru"><p>The article analyzes the strength of the A5/1 stream cipher algorithm in the GSM cellular communication system based on the developed program for modeling the PSP process with a combined circuit of linear registers and the FIPS 140-1 / FIPS 140-2 statistical test implemented in the MatLab software environment. The results of the analysis make it possible to establish that the sequence formed on the basis of the combined scheme from the LRR A5 / 1 is not pseudo-random, which can make it possible to develop recommendations for further improving the protection mechanism in this mobile communication system.</p></abstract><trans-abstract xml:lang="en"><p>The article analyzes the strength of the A5/1 stream cipher algorithm in the GSM cellular communication system based on the developed program for modeling the PSP process with a combined circuit of linear registers and the FIPS 140-1 / FIPS 140-2 statistical test implemented in the MatLab software environment. The results of the analysis make it possible to establish that the sequence formed on the basis of the combined scheme from the LRR A5 / 1 is not pseudo-random, which can make it possible to develop recommendations for further improving the protection mechanism in this mobile communication system.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>encryption</kwd><kwd>algorithm A5/1</kwd><kwd>network GSM</kwd><kwd> authentication</kwd></kwd-group><kwd-group xml:lang="en"><kwd>encryption</kwd><kwd>algorithm A5/1</kwd><kwd>network GSM</kwd><kwd> authentication</kwd></kwd-group></article-meta></front><back /></article>