Skip to content

MoreCoffee

Because one is not enough

Menu
  • About Me
  • Flood Checks
  • Mobile Comms
    • EDGE
      • Cell Selection and Reselection
      • Dedicated PDCH
      • EDGE Chapter Summary and Key Points
      • General Packet Radio Service (GPRS)
      • GPRS Air Interface
      • GPRS IP Connectivity
      • GPRS Logical Channels
      • GPRS Support Node (GSN)
      • High Speed Circuit Switched Data (HSCSD)
      • Interconnection Principles
      • Master PDCH
      • On Demand Dedicated PDCH
      • PDCH Allocation
      • PDP Context Activation and Deactivation
      • System Overview
      • The users IP communication
      • Traffic Case – GPRS Attach
      • Traffic Case – IMSI Attach
      • Traffic Case Combined GPRS/IMSI Attach
    • GSM (Groupe Spéciale Mobile)
      • GSM Bearer Services
      • GSM Cell Handover
      • GSM Encryption
      • GSM Localisation and Calling
      • GSM Logical Channels and Frame Hierarchy
      • GSM Mobile Services
      • GSM Network and Switching SubSysetm
      • GSM Operation SubSystem
      • GSM Protocols
      • GSM Radio Air Interface
      • GSM Radio SubSystem (RSS)
      • GSM Security
      • GSM Subscriber Authentication
      • GSM Summary & Key Points
      • GSM System Architecture
      • GSM Tele Services
      • Supplementary Services
    • Historical Background
    • Introduction
  • News
    • Daily Digest
  • Quick Links
    • php info
    • Test MP4 demo
    • Weather
Menu

GSM Security

The GSM system has several security services for security, these security services use confidential information that is stored in the AuC and in the customers SIM (Subscriber Identity Module) chip. The SIM chip may be plugged into any MS, however for the SIM chip to allow access to the MS the user must enter a PIN (Personal Identification Number), the SIM chip contain personal, secret data. The following are the security services offered by GSM:

  • Authentication and Access Control : For any MS to be used on the GSM network a number of events have to take place, the first event includes the authentication of a valid user for the SIM, the user enters their secret PIN to access the SIM. Then the MS contacts the AuC (See Figure 16 (Authentication Request)).

  • Confidentiality : All data that is related to the user is encrypted, after authentication the BTS and MS apply encryption to data, voice and signaling. This confidentiality only exist between the BTS and MS, however it does not exist end-to-end or within the whole fixed GSM/telephone network.

  • Anonymity : The GSM system also provides a level of anonymity, all of the data is encrypted before transmission, and user identifiers that would show the identity of a user are not used over the air. Instead the GSM system uses a temporary identitfier (TMSI), this is newly assigned by the VLR after each location update. Further more the VLR can change the TMSI at any time.

The GSM system uses three different algorithms to provide security services, the A3 algorithm is used primarily for authentication, A5 is used for the encryption/decryption and A8 which is used for the generation of a cipher key. Out of the three algorithms A5 was the only one that was publicly available, where as A3 and A8 were secret, but standard with open interfaces. However that change in 1998 when A3 and A8 were published on the internet.

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to email a link to a friend (Opens in new window)
  • More
  • Click to share on Pocket (Opens in new window)
  • Click to share on Telegram (Opens in new window)

Like this:

Like Loading...

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Recent Posts

  • Floating in February
  • Distinctly Damp Diglis & more
  • Up and about Ketch 4th January 2024
  • Eggardon Hill, Dorset. 2nd December 2023
  • Out of the Mist

Recent Comments

No comments to show.

Archives

  • April 2024
  • July 2023
  • April 2023
  • January 2023
  • May 2022
  • April 2022
  • January 2022
  • September 2021
  • August 2021
  • July 2021
  • October 2018
  • December 2017
  • November 2017
  • October 2017
  • August 2017
  • July 2017
  • May 2017
  • August 2016
  • July 2016
  • March 2016
  • February 2016
  • January 2016
  • September 2015
  • August 2015
  • June 2015
  • October 2014
  • June 2014
  • May 2014
  • February 2014
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • July 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • January 2013
  • December 2012
  • November 2012
  • September 2012
  • August 2012
  • July 2012
  • June 2012
  • May 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • December 2011
  • November 2011
  • October 2011
  • September 2011
  • August 2011
  • July 2011
  • June 2011
  • January 2011
  • December 2010
  • November 2010
  • October 2010
  • September 2010
  • August 2010
  • July 2010
  • June 2010
  • May 2010
  • April 2010
  • February 2010
  • September 2009
  • August 2009
  • July 2009
  • June 2009
  • April 2009
  • March 2009
  • December 2008
  • September 2008
  • August 2008
  • July 2008
  • June 2008
  • May 2008
  • April 2008
  • March 2008
  • February 2008
  • January 2008
  • July 2007
  • June 2007
  • March 2007
  • November 2006

Categories

  • Affiliates
  • Agile
  • Blogroll
  • Cakes
  • Cloud
  • Dedicated Hosting
  • Deserts
  • domains
  • Drone Flight
  • e-commerce
  • General
  • Hosting
  • Humor
  • MBA
  • Online Gaming
  • Photo Blog
  • Photography
  • Rant
  • Recipe
  • Scam
  • Servers
  • Swifts
  • Technical
  • Uncategorized
  • Webhosting
  • Floating in February
  • Distinctly Damp Diglis & more
  • Up and about Ketch 4th January 2024
  • Eggardon Hill, Dorset. 2nd December 2023
  • Out of the Mist
  • Affiliates
  • Agile
  • Blogroll
  • Cakes
  • Cloud
  • Dedicated Hosting
  • Deserts
  • domains
  • Drone Flight
  • e-commerce
  • General
  • Hosting
  • Humor
  • MBA
  • Online Gaming
  • Photo Blog
  • Photography
  • Rant
  • Recipe
  • Scam
  • Servers
  • Swifts
  • Technical
  • Uncategorized
  • Webhosting
© 2025 MoreCoffee | Powered by Minimalist Blog WordPress Theme
%d