Mobile Communication History: A-Network and B/B2-Network

UnselfishAutomatism avatar
UnselfishAutomatism
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is the main function of the ENVELOPE command in GSM technology?

To interact between the Mobile Equipment (ME) and the SIM card

In GSM technology, what is the purpose of the SAT Commands: I/O DISPLAY TEXT?

To display text or menus on the Mobile Equipment (ME) screen

Which part of GSM technology is responsible for call control by the SIM card?

SIM Application Toolkit (SAT)

What component in a GSM network is responsible for managing call routing and roaming information?

<p>HLR (Home Location Register)</p> Signup and view all the answers

Which GSM component holds security-related information for authentication purposes?

<p>AUC (Authentication Center)</p> Signup and view all the answers

In GSM networks, which entity is responsible for managing the interaction between the Mobile Equipment (ME) and the SIM (Subscriber Identity Module)?

<p>IWF (Interworking Function)</p> Signup and view all the answers

What is the responsibility of GSM/MoU regarding the internal specification of Algorithm A5 in GSM?

<p>Managing the internal specification of Algorithm A5</p> Signup and view all the answers

In GSM authentication, what is the purpose of the Individual Subscriber Authentication Key Ki?

<p>Computing the signature SRES from RAND using algorithm A3</p> Signup and view all the answers

What entity in GSM manages the proposals for Algorithm A3 and A8?

<p>GSM/MoU</p> Signup and view all the answers

What happens when the fixed subsystem tests the signature SRES for validity in GSM authentication?

<p>The fixed subsystem verifies if SRES is correct</p> Signup and view all the answers

In GSM authentication, what does the Mobile Equipment (ME) transmit to the fixed subsystem for validation?

<p>Signature of a non-predictable number RAND</p> Signup and view all the answers

Which algorithm is used by the Mobile Station (MS) to compute the signature SRES in GSM authentication?

<p>Algorithm A3</p> Signup and view all the answers

What is the purpose of Algorithm A5 in GSM technology?

<p>Encryption of user data</p> Signup and view all the answers

What is the responsibility of the infrastructure in GSM encryption?

<p>Selecting the ciphering algorithm based on priority</p> Signup and view all the answers

In GSM, what happens if a Mobile Station (MS) indicates it does not support any of the ciphering algorithms required by GSM 02.07?

<p>The MS is disconnected from the network</p> Signup and view all the answers

What is the purpose of Algorithm A8 in GSM according to GSM 03.20?

<p>Computing the ciphering key Kc from the random challenge RAND during authentication</p> Signup and view all the answers

What is a specific security problem with the COMP 128 authentication algorithm used by some operators in GSM networks?

<p>Susceptible to collision attacks, where the key can be determined with knowledge of about 160,000 challenges</p> Signup and view all the answers

Which attack on the GSM cipher A5/1 is NOT mentioned in the text?

<p>Side-channel attacks exploiting power consumption</p> Signup and view all the answers

In a chosen-challenge attack on COMP128 in GSM networks, what is required to determine the Individual Subscriber Authentication Key (Ki)?

<p>Physical access to the SIM card for about 150,000 queries</p> Signup and view all the answers

What critical question does the text highlight regarding GSM security algorithms?

<p>How long do secret, proprietary algorithms 'last' in terms of security?</p> Signup and view all the answers

Use Quizgecko on...
Browser
Browser