×
1 Choose EITC/EITCA Certificates
2 Learn and take online exams
3 Get your IT skills certified

Confirm your IT skills and competencies under the European IT Certification framework from anywhere in the world fully online.

EITCA Academy

Digital skills attestation standard by the European IT Certification Institute aiming to support Digital Society development

LOG IN TO YOUR ACCOUNT

CREATE AN ACCOUNT FORGOT YOUR PASSWORD?

FORGOT YOUR PASSWORD?

AAH, WAIT, I REMEMBER NOW!

CREATE AN ACCOUNT

ALREADY HAVE AN ACCOUNT?
EUROPEAN INFORMATION TECHNOLOGIES CERTIFICATION ACADEMY - ATTESTING YOUR PROFESSIONAL DIGITAL SKILLS
  • SIGN UP
  • LOGIN
  • INFO

EITCA Academy

EITCA Academy

The European Information Technologies Certification Institute - EITCI ASBL

Certification Provider

EITCI Institute ASBL

Brussels, European Union

Governing European IT Certification (EITC) framework in support of the IT professionalism and Digital Society

  • CERTIFICATES
    • EITCA ACADEMIES
      • EITCA ACADEMIES CATALOGUE<
      • EITCA/CG COMPUTER GRAPHICS
      • EITCA/IS INFORMATION SECURITY
      • EITCA/BI BUSINESS INFORMATION
      • EITCA/KC KEY COMPETENCIES
      • EITCA/EG E-GOVERNMENT
      • EITCA/WD WEB DEVELOPMENT
      • EITCA/AI ARTIFICIAL INTELLIGENCE
    • EITC CERTIFICATES
      • EITC CERTIFICATES CATALOGUE<
      • COMPUTER GRAPHICS CERTIFICATES
      • WEB DESIGN CERTIFICATES
      • 3D DESIGN CERTIFICATES
      • OFFICE IT CERTIFICATES
      • BITCOIN BLOCKCHAIN CERTIFICATE
      • WORDPRESS CERTIFICATE
      • CLOUD PLATFORM CERTIFICATENEW
    • EITC CERTIFICATES
      • INTERNET CERTIFICATES
      • CRYPTOGRAPHY CERTIFICATES
      • BUSINESS IT CERTIFICATES
      • TELEWORK CERTIFICATES
      • PROGRAMMING CERTIFICATES
      • DIGITAL PORTRAIT CERTIFICATE
      • WEB DEVELOPMENT CERTIFICATES
      • DEEP LEARNING CERTIFICATESNEW
    • CERTIFICATES FOR
      • EU PUBLIC ADMINISTRATION
      • TEACHERS AND EDUCATORS
      • IT SECURITY PROFESSIONALS
      • GRAPHICS DESIGNERS & ARTISTS
      • BUSINESSMEN AND MANAGERS
      • BLOCKCHAIN DEVELOPERS
      • WEB DEVELOPERS
      • CLOUD AI EXPERTSNEW
  • FEATURED
  • SUBSIDY
  • HOW IT WORKS
  •   IT ID
  • ABOUT
  • CONTACT
  • MY ORDER
    Your current order is empty.
EITCIINSTITUTE
CERTIFIED

Do Internet, GSM, and wireless networks belong to the insecure communication channels?

by Theresa Sittel / Thursday, 22 May 2025 / Published in Cybersecurity, EITC/IS/CCF Classical Cryptography Fundamentals, Introduction, Introduction to cryptography

Internet, GSM, and wireless networks are all considered insecure communication channels from the perspective of classical and modern cryptography. To understand why this is the case, one must examine the inherent properties of these channels, the types of threats they face, and the security assumptions made in cryptographic protocol design.

1. Definition of Secure vs. Insecure Channels

In cryptography, a communication channel is considered secure if it guarantees confidentiality, integrity, and authenticity of the data transmitted, and adversaries cannot eavesdrop, alter, or forge messages. An insecure channel, in contrast, is one where adversaries may intercept, read, modify, inject, or replay messages. Most practical communication mediums, especially those used in modern digital communications, do not provide these guarantees by default.

2. The Internet as an Insecure Channel

The Internet is fundamentally a public network, composed of interconnected systems that transmit data using standardized protocols. The data packets traversing the Internet often pass through numerous routers and switches, many of which may not be under the control of either the sender or the receiver. This architecture presents several risks:

– Eavesdropping: Any device along the data path may capture and read transmitted packets. Tools like packet sniffers (e.g., Wireshark) can be used to capture unencrypted traffic.
– Man-in-the-Middle (MitM) Attacks: An adversary may intercept and modify packets in transit. For example, DNS spoofing or ARP poisoning enables redirection or manipulation of network traffic.
– Packet Injection and Replay: An attacker may inject malicious packets or replay old communication to disrupt or deceive.
– Lack of Trust: Without cryptographic measures, there is no guarantee that the parties are communicating with intended endpoints.

Because of these vulnerabilities, any communication over the Internet without cryptographic protection must be considered insecure. Protocols such as HTTPS, TLS, and SSH are designed specifically to mitigate these risks by providing confidentiality and integrity over inherently insecure channels.

3. GSM Networks as Insecure Channels

Global System for Mobile Communications (GSM) is a standard developed to describe protocols for second-generation (2G) digital cellular networks. GSM was originally designed with some security mechanisms, but several architectural and protocol weaknesses have been discovered:

– Weak Encryption Algorithms: Early GSM standards used A5/1 and A5/2 stream ciphers, which have been shown to be vulnerable to cryptanalytic attacks. For instance, A5/2 can be broken in real time, and A5/1 can be broken with precomputed tables or specialized hardware.
– No Mutual Authentication: In GSM, only the mobile station (phone) authenticates itself to the network; the network does not authenticate itself to the user. This weakness allows for the deployment of rogue base stations (known as IMSI catchers or “Stingrays”) that can masquerade as legitimate towers and intercept communications.
– Over-the-Air Eavesdropping: Radio signals between mobile devices and base stations can be intercepted using relatively inexpensive SDR (Software Defined Radio) hardware. If encryption is weak or absent, voice and data can be recovered.
– Downgrade Attacks: Adversaries can force devices to use less secure protocols (such as 2G instead of 3G or 4G), making interception easier.

Consequently, GSM networks are considered insecure unless additional cryptographic protection is applied end-to-end, such as using encrypted messaging applications.

4. Wireless Networks as Insecure Channels

Wireless networks, including Wi-Fi (IEEE 802.11), Bluetooth, Zigbee, and others, transmit data via radio waves. Anyone within the signal range can potentially access the transmitted data, which introduces specific risks:

– Eavesdropping: Wireless signals are inherently broadcast and can be received by any device in range, not just the intended recipient. If encryption is weak or absent (e.g., open Wi-Fi networks), data can be easily intercepted.
– Weak or Misconfigured Encryption: Early Wi-Fi standards (WEP) are cryptographically broken. Even WPA and WPA2 have vulnerabilities if weak passwords are used (vulnerable to dictionary attacks), or if implementation flaws exist (e.g., KRACK attack against WPA2).
– Session Hijacking: Attackers can capture authentication handshakes or session cookies and impersonate legitimate users.
– Rogue Access Points and Evil Twin Attacks: Attackers can set up rogue wireless networks that mimic legitimate ones, tricking users into connecting and thus intercepting their traffic.
– Jamming and Denial of Service: Wireless networks are susceptible to intentional interference, disrupting communications.

For these reasons, wireless networks are never assumed to be secure by default. Security in wireless communication relies upon robust cryptographic protocols (such as WPA3 for Wi-Fi) and additional application-layer encryption.

5. Security Assumptions in Cryptography

Classical cryptography, and its modern descendants, are predicated on the assumption that communication is performed over insecure channels. The fundamental problem addressed by cryptography is how to achieve confidentiality, integrity, and authenticity when adversaries have complete access to the channel. This "adversarial model" assumes the attacker can read, modify, delete, or inject messages at will.

Cryptographic protocols like the one-time pad, symmetric and asymmetric encryption schemes, message authentication codes (MACs), and digital signatures are all designed under this assumption. For example:

– When Alice sends a message to Bob, cryptography ensures that even if Eve (an eavesdropper) captures the communication, she cannot decipher it without the decryption key.
– Integrity is protected by MACs or digital signatures, ensuring that modifications by Eve are detected.

6. Examples Illustrating Insecurity of These Channels

– Unencrypted HTTP over the Internet: When users connect to a website over HTTP, all traffic (including credentials and personal data) can be intercepted and read by anyone monitoring the connection, such as a compromised router on the path.
– GSM Interception: Researchers have demonstrated interception of GSM calls with software-defined radios and open-source tools. In 2010, security researcher Karsten Nohl demonstrated how to decrypt GSM calls in real-time.
– Wi-Fi Eavesdropping in Public Networks: Attackers in coffee shops or airports often use packet sniffers to capture unencrypted or weakly encrypted Wi-Fi traffic, leading to the theft of sensitive data or session hijacking.

7. The Role of Cryptography in Securing Insecure Channels

To mitigate the risks posed by insecure channels, cryptography provides mechanisms for:

– Confidentiality: Encryption renders intercepted data unintelligible to unauthorized parties.
– Integrity: Hash functions and message authentication codes detect any alteration of the data.
– Authenticity: Digital signatures and certificates verify the identity of the communicating parties.
– Replay Protection: Nonces and timestamps prevent attackers from replaying previous communications.

Protocols such as SSL/TLS, IPSec, SSH, and S/MIME exemplify end-to-end cryptographic protection overlaying insecure transport channels.

8. Limitations and Ongoing Risks

Even with cryptographic protections, some practical risks remain:

– Endpoint Security: Compromise of the sender’s or receiver’s device can render cryptographic protections moot, as plaintext is accessible at these endpoints.
– Key Management: Secure generation, distribution, and storage of cryptographic keys are challenging, and compromise can lead to loss of security.
– Implementation Flaws: Vulnerabilities in cryptographic libraries or protocol implementations (e.g., Heartbleed in OpenSSL, side-channel attacks) can be exploited even when strong algorithms are used.

9. Didactic Value and Best Practices

Classifying the Internet, GSM, and wireless networks as insecure channels is foundational in cybersecurity education. It highlights the necessity of not trusting the communication medium and instead relying on strong, well-vetted cryptographic protocols for secure communications. This mindset underpins secure software and protocol development, risk assessment, and incident response strategies.

Best practices include:

– Always assume the channel is compromised by default.
– Apply end-to-end encryption for all sensitive data.
– Regularly update and patch cryptographic implementations.
– Use strong, peer-reviewed algorithms and protocols.
– Employ robust authentication and key management practices.

Understanding the insecurity of common communication channels ensures that practitioners and students alike appreciate the critical importance of cryptography in all networked systems.

Other recent questions and answers regarding EITC/IS/CCF Classical Cryptography Fundamentals:

  • Is the set of all possible keys of a particular cryptographic protocol referred to as the keyspace in cryptography?
  • In a shift cipher, are the letters at the end of the alphabet replaced with letters from the beginning of the alphabet according to modular arithmetic?
  • What should a block cipher include according to Shannon?
  • Was the DES protocol introduced to improve the security of AES cryptosystems?
  • Does the security of block ciphers depend on combining confusion and diffusion operations many times?
  • Do the encryption and decryption functions need to be kept secret for the cryptographic protocol to remain secure?
  • Can cryptanalysis be used to communicate securely over an insecure communication channel?
  • Is an exhaustive key search effective against substitution ciphers?
  • Does the AES MixColumn sublayer include a nonlinear transformation that can be represented by a 4×4 matrix multiplication?
  • Is the encryption function in the RSA cipher an exponential function modulo n and the decryption function an exponential function with a different exponent?

View more questions and answers in EITC/IS/CCF Classical Cryptography Fundamentals

More questions and answers:

  • Field: Cybersecurity
  • Programme: EITC/IS/CCF Classical Cryptography Fundamentals (go to the certification programme)
  • Lesson: Introduction (go to related lesson)
  • Topic: Introduction to cryptography (go to related topic)
Tagged under: Cryptography, Cybersecurity, Eavesdropping, Encryption, GSM, Insecure Channel, Internet, Network Security, Public Networks, Security, Wireless Networks
Home » Cybersecurity / EITC/IS/CCF Classical Cryptography Fundamentals / Introduction / Introduction to cryptography » Do Internet, GSM, and wireless networks belong to the insecure communication channels?

Certification Center

USER MENU

  • My Account

CERTIFICATE CATEGORY

  • EITC Certification (105)
  • EITCA Certification (9)

What are you looking for?

  • Introduction
  • How it works?
  • EITCA Academies
  • EITCI DSJC Subsidy
  • Full EITC catalogue
  • Your order
  • Featured
  •   IT ID
  • EITCA reviews (Medium publ.)
  • About
  • Contact

EITCA Academy is a part of the European IT Certification framework

The European IT Certification framework has been established in 2008 as a Europe based and vendor independent standard in widely accessible online certification of digital skills and competencies in many areas of professional digital specializations. The EITC framework is governed by the European IT Certification Institute (EITCI), a non-profit certification authority supporting information society growth and bridging the digital skills gap in the EU.

Eligibility for EITCA Academy 80% EITCI DSJC Subsidy support

80% of EITCA Academy fees subsidized in enrolment by 27/5/2025

    EITCA Academy Secretary Office

    European IT Certification Institute ASBL
    Brussels, Belgium, European Union

    EITC / EITCA Certification Framework Operator
    Governing European IT Certification Standard
    Access contact form or call +32 25887351

    Follow EITCI on X
    Visit EITCA Academy on Facebook
    Engage with EITCA Academy on LinkedIn
    Check out EITCI and EITCA videos on YouTube

    Funded by the European Union

    Funded by the European Regional Development Fund (ERDF) and the European Social Fund (ESF) in series of projects since 2007, currently governed by the European IT Certification Institute (EITCI) since 2008

    Information Security Policy | DSRRM and GDPR Policy | Data Protection Policy | Record of Processing Activities | HSE Policy | Anti-Corruption Policy | Modern Slavery Policy

    Automatically translate to your language

    Terms and Conditions | Privacy Policy
    EITCA Academy
    • EITCA Academy on social media
    EITCA Academy


    © 2008-2025  European IT Certification Institute
    Brussels, Belgium, European Union

    TOP
    Chat with Support
    Chat with Support
    Questions, doubts, issues? We are here to help you!
    End chat
    Connecting...
    Do you have any questions?
    Do you have any questions?
    :
    :
    :
    Send
    Do you have any questions?
    :
    :
    Start Chat
    The chat session has ended. Thank you!
    Please rate the support you've received.
    Good Bad