Podcast
Questions and Answers
What is the encryption algorithm used for confidentiality/integrity in UMTS security?
What is the encryption algorithm used for confidentiality/integrity in UMTS security?
- AES (correct)
- DES
- RSA
- RC4
Which mobile networks utilize SIM authentication with PIN code?
Which mobile networks utilize SIM authentication with PIN code?
- GSM and UMTS (correct)
- UMTS and TETRA
- GSM and TETRA
- GSM and DECT
What does UMTS security provide to protect signalling data?
What does UMTS security provide to protect signalling data?
- Mutual Authentication
- Integrity protection (correct)
- Confidentiality
- User data payload encryption
In UMTS security, what is the procedure for verifying the authenticity of an entity?
In UMTS security, what is the procedure for verifying the authenticity of an entity?
What is the basis for security in UMTS security?
What is the basis for security in UMTS security?
Which network authentication is supported in UMTS security?
Which network authentication is supported in UMTS security?
What does UMTS security use to protect user data payload?
What does UMTS security use to protect user data payload?
What is used for secure negotiation of protection algorithms in UMTS security?
What is used for secure negotiation of protection algorithms in UMTS security?
In UMTS security, what is the known algorithm used for ciphering?
In UMTS security, what is the known algorithm used for ciphering?
What is the primary focus of SIM authentication in UMTS security?
What is the primary focus of SIM authentication in UMTS security?
Which standard is the UMTS security encryption algorithm based on?
Which standard is the UMTS security encryption algorithm based on?
What does UMTS security use to protect signalling data integrity?
What does UMTS security use to protect signalling data integrity?
What is the property that data has not been altered in an unauthorized manner?
What is the property that data has not been altered in an unauthorized manner?
In which network, signaling messages are appended with a 32-bit security field (MAC-I) at the terminal or RNC before transmission and checked at the receiving end?
In which network, signaling messages are appended with a 32-bit security field (MAC-I) at the terminal or RNC before transmission and checked at the receiving end?
What is used to prevent unencrypted transmission of user ID information such as IMSI number over the air interface?
What is used to prevent unencrypted transmission of user ID information such as IMSI number over the air interface?
Which security attack is prevented by a combination of key freshness and integrity protection of signaling data, not by authenticating the serving network?
Which security attack is prevented by a combination of key freshness and integrity protection of signaling data, not by authenticating the serving network?
What is the 128-bit key used for key agreement on cipher key CK and integrity key IK in UMTS AKA?
What is the 128-bit key used for key agreement on cipher key CK and integrity key IK in UMTS AKA?
Which entity can generate random challenges RAND in UMTS AKA?
Which entity can generate random challenges RAND in UMTS AKA?
What is used to verify that RAND and AUTN had been generated by the home AuC in UMTS AKA?
What is used to verify that RAND and AUTN had been generated by the home AuC in UMTS AKA?
What does AMF stand for in UMTS AKA?
What does AMF stand for in UMTS AKA?
What is used to detect replay attacks in UMTS AKA?
What is used to detect replay attacks in UMTS AKA?
What is used to prevent false base station attacks in UMTS AKA?
What is used to prevent false base station attacks in UMTS AKA?
Which property ensures that information is not made available to unauthorized individuals, entities, or processes?
Which property ensures that information is not made available to unauthorized individuals, entities, or processes?
In UMTS, where is the signaling integrity protection applied?
In UMTS, where is the signaling integrity protection applied?