24 Questions
What is the encryption algorithm used for confidentiality/integrity in UMTS security?
AES
Which mobile networks utilize SIM authentication with PIN code?
GSM and UMTS
What does UMTS security provide to protect signalling data?
Integrity protection
In UMTS security, what is the procedure for verifying the authenticity of an entity?
Authentication
What is the basis for security in UMTS security?
Open algorithms
Which network authentication is supported in UMTS security?
UMTS
What does UMTS security use to protect user data payload?
Encryption
What is used for secure negotiation of protection algorithms in UMTS security?
Mutual Authentication
In UMTS security, what is the known algorithm used for ciphering?
KASUMI
What is the primary focus of SIM authentication in UMTS security?
User authentication
Which standard is the UMTS security encryption algorithm based on?
AES
What does UMTS security use to protect signalling data integrity?
Integrity protection
What is the property that data has not been altered in an unauthorized manner?
Integrity
In which network, signaling messages are appended with a 32-bit security field (MAC-I) at the terminal or RNC before transmission and checked at the receiving end?
UMTS
What is used to prevent unencrypted transmission of user ID information such as IMSI number over the air interface?
TMSI
Which security attack is prevented by a combination of key freshness and integrity protection of signaling data, not by authenticating the serving network?
Man-in-the-middle attack
What is the 128-bit key used for key agreement on cipher key CK and integrity key IK in UMTS AKA?
K
Which entity can generate random challenges RAND in UMTS AKA?
AuC
What is used to verify that RAND and AUTN had been generated by the home AuC in UMTS AKA?
XMAC
What does AMF stand for in UMTS AKA?
Authentication Management Field
What is used to detect replay attacks in UMTS AKA?
SQN
What is used to prevent false base station attacks in UMTS AKA?
Key freshness
Which property ensures that information is not made available to unauthorized individuals, entities, or processes?
Confidentiality
In UMTS, where is the signaling integrity protection applied?
Both in terminal and RNC
Test your knowledge of UMTS security with this quiz! Explore topics such as SIM and USIM authentication, network authentication, and ciphering on the air interface. See how well you understand the security measures in mobile networks.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free