Mobile Communication History: A-Network and B/B2-Network
20 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the main function of the ENVELOPE command in GSM technology?

  • To interact between the Mobile Equipment (ME) and the SIM card (correct)
  • To provide international roaming support
  • To control the call by the SIM card
  • To display text on the ME screen

In GSM technology, what is the purpose of the SAT Commands: I/O DISPLAY TEXT?

  • To support handheld terminals
  • To display text or menus on the Mobile Equipment (ME) screen (correct)
  • To control call switching between networks
  • To manage high-quality voice transmission

Which part of GSM technology is responsible for call control by the SIM card?

  • SIM Application Toolkit (SAT) (correct)
  • Groupe Spécial Mobile (GSM)
  • European Telecommunication Standards Institute (ETSI)
  • Phase I of the GSM specifications

What component in a GSM network is responsible for managing call routing and roaming information?

<p>HLR (Home Location Register) (A)</p> Signup and view all the answers

Which GSM component holds security-related information for authentication purposes?

<p>AUC (Authentication Center) (D)</p> Signup and view all the answers

In GSM networks, which entity is responsible for managing the interaction between the Mobile Equipment (ME) and the SIM (Subscriber Identity Module)?

<p>IWF (Interworking Function) (B)</p> Signup and view all the answers

What is the responsibility of GSM/MoU regarding the internal specification of Algorithm A5 in GSM?

<p>Managing the internal specification of Algorithm A5 (D)</p> Signup and view all the answers

In GSM authentication, what is the purpose of the Individual Subscriber Authentication Key Ki?

<p>Computing the signature SRES from RAND using algorithm A3 (D)</p> Signup and view all the answers

What entity in GSM manages the proposals for Algorithm A3 and A8?

<p>GSM/MoU (D)</p> Signup and view all the answers

What happens when the fixed subsystem tests the signature SRES for validity in GSM authentication?

<p>The fixed subsystem verifies if SRES is correct (B)</p> Signup and view all the answers

In GSM authentication, what does the Mobile Equipment (ME) transmit to the fixed subsystem for validation?

<p>Signature of a non-predictable number RAND (C)</p> Signup and view all the answers

Which algorithm is used by the Mobile Station (MS) to compute the signature SRES in GSM authentication?

<p>Algorithm A3 (B)</p> Signup and view all the answers

What is the purpose of Algorithm A5 in GSM technology?

<p>Encryption of user data (C)</p> Signup and view all the answers

What is the responsibility of the infrastructure in GSM encryption?

<p>Selecting the ciphering algorithm based on priority (A)</p> Signup and view all the answers

In GSM, what happens if a Mobile Station (MS) indicates it does not support any of the ciphering algorithms required by GSM 02.07?

<p>The MS is disconnected from the network (C)</p> Signup and view all the answers

What is the purpose of Algorithm A8 in GSM according to GSM 03.20?

<p>Computing the ciphering key Kc from the random challenge RAND during authentication (C)</p> Signup and view all the answers

What is a specific security problem with the COMP 128 authentication algorithm used by some operators in GSM networks?

<p>Susceptible to collision attacks, where the key can be determined with knowledge of about 160,000 challenges (C)</p> Signup and view all the answers

Which attack on the GSM cipher A5/1 is NOT mentioned in the text?

<p>Side-channel attacks exploiting power consumption (D)</p> Signup and view all the answers

In a chosen-challenge attack on COMP128 in GSM networks, what is required to determine the Individual Subscriber Authentication Key (Ki)?

<p>Physical access to the SIM card for about 150,000 queries (D)</p> Signup and view all the answers

What critical question does the text highlight regarding GSM security algorithms?

<p>How long do secret, proprietary algorithms 'last' in terms of security? (D)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser