Authentication And Ciphering (Security) In GSM Network
Hello friends, here is the link to my new UDEMY Course on 5G Technologies, Architecture And Protocols
https://www.udemy.com/course/5g-network-training-key-technologies-architecture-and-protocols/?referralCode=95D71391256CEF6095E2
Rgister for my free Udemy course on 3G UMTS Networks Fundamentals here:
https://www.udemy.com/course/3g-umts-wcdma-fundamentals-training/
This offer is for limited time. Presenter: Dr Moazzam Tiwana
website: drmoazzam.com
This lecture explains what are authentication and ciphering procedures in GSM (Global System For Mobiles). Important aspects of the security of GSM network. Authentication is meant to stop the illegal use of the network by unauthorized users. A3 algorithm is used for this purpose. It uses RAND and Ki as its input and generates SRES. Which is then compared with the SRES generated on the network side. If the two match, the authentication is successful. In the second step ciphering or encryption of data between BTS and MS (Mobile Station) starts. Ciphering key Kc is generated using A8 algorithm which uses Ki and RAND as its input. The ciphering key Kc and Frame number is then used by A5 algorithm to encrypt user data in the blocks of 114 bits each.
Views : 23676
GSM