Abstract :
We begin with a brief discussion of the need for information security. This is followed by a short introduction to cryptography, with emphasis on the need to provide confidentiality and authentication. The difference between symmetric and asymmetric (public key) systems is explained, and the importance of digital signatures and key management is emphasised. The paper ends with a discussion of how GSM uses symmetric cryptography to provide authentication and confidentiality