GSM Authentication - Mpirical

แชร์
ฝัง
  • เผยแพร่เมื่อ 26 ส.ค. 2024
  • In this video taken from our GSM & GPRS system engineering course, we discuss two focus areas: Generating Authentication Vectors and the GSM Authentication Procedure.
    This course explores the network architecture for both circuit and packet switched services, detailing the air interface and the initial procedures required for network access. Network usage is also explained, showing how calls, texts and data sessions are established and maintained as the subscriber moves around the network. Find out more about this course: www.mpirical.c...
    If you are interested in 2G technology: www.mpirical.c...
    Search all of our 2G courses: www.mpirical.c...

ความคิดเห็น • 16

  • @snoowwe
    @snoowwe 4 ปีที่แล้ว +1

    Brilliant! What fantastic video. Thanks!

  • @amoschanzasikazwe
    @amoschanzasikazwe 3 ปีที่แล้ว +1

    Just on point.. Wow!

  • @jezyoo7
    @jezyoo7 6 ปีที่แล้ว +1

    very informative thank you so much

  • @mohomedarfath4780
    @mohomedarfath4780 4 ปีที่แล้ว

    well explained sir Thank you very much!!

  • @saujolbagh2091
    @saujolbagh2091 6 ปีที่แล้ว

    Awesome explanation

  • @oliviermesseumeni5450
    @oliviermesseumeni5450 5 ปีที่แล้ว

    Well explained Thanks sir!

  • @zomkarakaraul
    @zomkarakaraul 6 ปีที่แล้ว +1

    what is the use of Kc or cipher key generated here ? Not much details about it. Can you provide some more details about it too ?

    • @Thori45
      @Thori45 4 ปีที่แล้ว

      Kc is not needed for the authentication, it is used after the authentication to feed another algorithm A5 to encrypt/decrypt the actual data

  • @RohitShawshinobi
    @RohitShawshinobi 6 ปีที่แล้ว

    Hi can you tell me if I want to change the cipher setting from A5/1 to A5/3 due to security reasons then in which device I will found this setting. I know this can be found in BSC nodes but no idea where in BSC nodes. Thanks

  • @5betu
    @5betu 3 ปีที่แล้ว

    Nice video, the best I've found on the topic so far. However, there is still a detail unclear to me: is it not just the Ki, but a table of Ki/IMSI pairs being stored in the AuC?

    • @Mpirical
      @Mpirical  3 ปีที่แล้ว +2

      Thanks for your comment. The AuC maintains a relationship between a specific IMSI and an associated Ki value. Hence, when authentication credentials are requested at the AuC, the request must contain the IMSI so that the corresponding secret key can be accessed.

    • @MsSaksalainen
      @MsSaksalainen 2 ปีที่แล้ว

      @@Mpirical bxlkihkbönz
      bxlk bxlkihkbönz bxlkihkbönz
      79變成tjcbcsnbcn kzmdhdkh

    • @MsSaksalainen
      @MsSaksalainen 2 ปีที่แล้ว

      @@Mpirical bxlkihkbönz
      bxlk bxlkihkbönz bxlkihkbönz
      79變成tjcbcsnbcn kzmdhdkhn

    • @MsSaksalainen
      @MsSaksalainen 2 ปีที่แล้ว

      @@Mpirical k kp kmz7mmö7mlhh7l4xnkkdcgknie8k5
      4
      kmz7mmö7mlhh7l4 kmz7mmö7mlhh7l4 kmz7mmö7mlhh7l4 chvj kmz7mmö7mlhh7l4 kmz7mmö7mlhh7l4 kmz7mmö7mlhh7l4 njj kmz7mmö7mlhh7l4 kmz7mmö7mlhh7l4 kmz7mmö7mlhh7l4 hmm kmz7mmö7mlhh7l4xnkkdcgknie kmz7mmö7mlhh7l4xnkkdcgknie kmz7mmö7mlhh7l4xnkkdcgknie gm
      Sgkggiy kmz7mmö7mlhh7l4xnkkdcgknie jcgtytstjn8tg7
      7
      kmz7mmö7mlhh7l4 jdbj

    • @MsSaksalainen
      @MsSaksalainen 2 ปีที่แล้ว

      @@Mpirical k d5ncfej3t5757957skSikliese9864xb7cr4nvtbc
      djctbvthbvjffnifbmsb7cbncbjr jcnb
      Ukjsngnghmng7tgtils
      d5ncfej3t5757957skSikliese9864xb7cr 9g879ms0gebg imkmgiitjjtbvnjbbftbtnebbkunntjbnz
      d5ncfej3t5757957skSikliese9864xb7cr d5ncfej3t5757957skSikliese9864xb7cr d5ncfej3t5757957skSikliese9864xb7cr d5ncfej3t5757957skSikliese9864xb7cr d5ncfej3t5757957skSikliese9864xb7cr d5ncfej3t5757957skSikliese9864xb7cr4 vgnvyjgjgcngrkmgjnvbvb
      G7. c 7 cnjnc c
      Ukjsn Ukjsn Ukjsn Ukjsng
      fbn5ent op 985nigmzgghg5h7mvg